Mimikatz: LSASS Dump
Extract Credentials from Memory
Mimikatz extracts plaintext passwords, NTLM hashes, and Kerberos tickets directly from LSASS process memory on a compromised host.
Prerequisites:Local administrator on target hostMimikatz.exe or equivalent toolDebug privileges (SeDebugPrivilege)
1
Launch Mimikatz with Elevated Privileges
Mimikatz: LSASS Dump — Step 1/4
C:\Tools>
Click or press Enter to skip
Step 1: Launch Mimikatz
Mimikatz is the single most impactful offensive security tool in AD history. Created by Benjamin Delpy in 2011, it demonstrated that Windows stores credentials in memory in extractable ways.
We are launching the Mimikatz tool on a machine where we already have administrator access. Think of it like opening a locksmith's toolkit — the real work happens in the next steps.
Detection Events
4688Process creation (mimikatz.exe)
Attack Flow
Request
Response
Attack
Data