URL details: eladshamir.com/2018/03/19/Internal-Monologue.html

URL title: Internal Monologue Attack - Retrieving NTLM Hashes without Touching LSASS | Elad Shamir
URL description: Mimikatz is a well-regarded post-exploitation tool, which allows adversaries to extract plain text passwords, NTLM hashes and Kerberos tickets from memory, as well as perform attacks such as pass-the-hash, pass-the-ticket or build a golden ticket. Arguably, the primary use of Mimikatz is retrieving user credentials from LSASS process memory for use in post exploitation lateral movement. Recently, Microsoft has introduced Credential Guard in Windows 10 Enterprise and Windows Server 2016, which uses virtualiz
URL last crawled: 2022-05-24
URL speed: 0.113 MB/s, downloaded in 0.200 seconds

open external url

We found no external links pointing to this url.