Skills2026年5月15日·1 分钟阅读

Mimikatz — Windows Credential Security Research Tool

A security research tool for testing Windows credential protection mechanisms, widely used by penetration testers and red teams to audit authentication security.

Agent 就绪

这个资产可以被 Agent 直接读取和安装

TokRepo 同时提供通用 CLI 命令、安装契约、metadata JSON、按适配器生成的安装计划和原始内容链接,方便 Agent 判断适配度、风险和下一步动作。

Native · 98/100策略:允许
Agent 入口
任意 MCP/CLI Agent
类型
Skill
安装
Single
信任
信任等级:Established
入口
Mimikatz Overview
通用 CLI 安装命令
npx tokrepo install 7b2a0fd7-509b-11f1-9bc6-00163e2b0d79

Introduction

Mimikatz is a security research tool created by Benjamin Delpy that demonstrates weaknesses in Windows credential storage and authentication protocols. It is an essential tool in authorized penetration testing engagements for validating whether credential protection controls are properly configured.

What Mimikatz Does

  • Extracts plaintext passwords, hashes, and Kerberos tickets from Windows memory
  • Demonstrates pass-the-hash and pass-the-ticket attack techniques for security assessments
  • Tests Windows Credential Guard and LSA protection effectiveness
  • Interacts with Active Directory certificate services for golden ticket research
  • Validates whether security hardening measures like RunAsPPL are correctly deployed

Architecture Overview

Mimikatz is written in C and directly interfaces with Windows LSASS process memory and Security Support Provider Interface (SSPI). It uses undocumented Windows internals to read credential material from the Local Security Authority Subsystem. The modular design separates functionality into modules such as sekurlsa, kerberos, lsadump, and crypto.

Self-Hosting & Configuration

  • Runs as a standalone portable executable on Windows systems
  • Requires administrator privileges and SeDebugPrivilege for most operations
  • No installation or configuration files needed
  • Can be compiled from source using Visual Studio with the Windows SDK
  • Often deployed within authorized pentest environments or isolated labs

Key Features

  • Kerberos ticket extraction, forging, and pass-the-ticket capabilities
  • DCSync attack simulation for testing domain controller replication security
  • Smart card and certificate manipulation for PKI security assessments
  • Built-in RPC and network-based remote execution for distributed testing
  • Skeleton key module for testing domain-wide authentication bypass defenses

Comparison with Similar Tools

  • Rubeus — .NET Kerberos toolset; more focused on Kerberos abuse but less comprehensive overall
  • Impacket — Python library for network protocol interaction; complements Mimikatz for remote attacks
  • SharpHound/BloodHound — maps AD attack paths but does not extract credentials directly
  • LaZagne — cross-platform credential recovery; less depth on Windows-specific mechanisms
  • Hashcat — focuses on offline hash cracking rather than live credential extraction

FAQ

Q: Is Mimikatz legal to use? A: It is a legitimate security research tool. Use it only in authorized penetration testing engagements, CTF competitions, or controlled lab environments.

Q: How do defenders detect Mimikatz? A: Enable Credential Guard, configure LSA protection (RunAsPPL), monitor LSASS access with Sysmon, and deploy endpoint detection rules for known Mimikatz signatures.

Q: Does Mimikatz work on modern Windows? A: Recent Windows versions with Credential Guard and virtualization-based security significantly limit its effectiveness, which is precisely what pentesters validate.

Q: Can it run on Linux? A: Mimikatz is Windows-only. However, Impacket provides similar network-based credential testing from Linux systems.

Sources

讨论

登录后参与讨论。
还没有评论,来写第一条吧。

相关资产