Let's perform the following steps:
- Once we have the Meterpreter and system privileges, we can load up Mimikatz using the following command:
load mimikatz
- To view all of the available options, type the following command:
help mimikatz
The output of running the preceding command can be seen in the following screenshot:
- Now, to retrieve passwords from memory, we will use the built-in msv command of Metasploit:
msv
The output of running the preceding command can be seen in the following screenshot:
- We can see that the NT LAN Manager (NTLM) has been shown on screen. To view Kerberos credentials, type in the following command:
kerberos
The output of running the preceding command can be seen in the following screenshot:
If there were any credentials, they would have been shown in the preceding screenshot.