-
Will be in Tel Aviv for
@BlueHatIL, for a talk about#mimikatz and DPAPI internals
Only the 5th (busy kiwi is busy), but with stickers
> https://www.bluehatil.com/abstracts#collapse-DPAPI …pic.twitter.com/ZerAoLAckG
-
Check out our new trainings at TROOPERS
#TR20: - Fuzzing source-code and binary-only targets like a pro - Mastering#Mimikatz -#SensePost Unplugged; Modern WiFi Hacking Your seat is waiting for you!
https://troopers.de/troopers20/trainings/ … -
Uncovering
#Mimikatz ‘msv’ and collecting credentials through PyKD https://www.matteomalvica.com/blog/2020/01/20/mimikatz-lsass-dump-windg-pykd/ … -
If you want to grab me and speak
#pingcastle (or#mimikatz) you can find me in Malaga at the#First /#TF-CSIRT join meeting. Final call for bugs / feedback / comment before the release of 2.8!pic.twitter.com/cJG9S4itJn
-
Ho yes, unlike
#mimikatz, it's not a Windows only source code. Works on Linux too, and others UNIX with recent SSL library. "#curveball#cve20200601, 9/10, will compile and link again" https://twitter.com/gentilkiwi/status/1219305687643230210 …pic.twitter.com/IJGV9MAOBs
-
That epic Microsoft moment

#cve20200601#curveball Recently worked on#mimikatz and ECC, so yes, 10 and 2016/2019 only. Previous versions like Windows 7 did not support personnal EC curves (only few NIST standard ones) pic.twitter.com/EayEuFVv1JPrikaži ovu nit -
For the first time at
#TR20 we are offering a "Mastering Mimikatz" training by@Carlos_perez! You will learn - Credential & secret extraction with DPAPI/DPAPI-NG; - Kerberos Security and abuse; - Use of#Mimikatz tools for Research; - and more! https://troopers.de/troopers20/trainings/f9n8xx/ … -
Dumping LSASS without Mimikatz with MiniDumpWriteDump == Reduced Chances of Getting Flagged by AVs https://ired.team/offensive-security/credential-access-and-credential-dumping/dumping-lsass-passwords-without-mimikatz-minidumpwritedump-av-signature-bypass …
#dfir#mimikatz#evasion#redteam#windows -
How often do you see an actor's cheat sheet? Developers making tools used in the
#xHunt campaign left a text file with example commands in their#Sakabota tool. Psst, they love RDP and credential dumping with#Mimikatz https://unit42.paloaltonetworks.com/xhunt-actors-cheat-sheet/ … -
pypykatz 0.3.0 is out. Now parsing dumps that
#mimikatz can't parse :) New features: 1. better template selection. 2. greppable output 3. made place for upcoming NT support 4. supports external readers, like@HackAndDo 's upcoming#impacket interfacehttps://github.com/skelsec/pypykatz …Prikaži ovu nit -
Pour le week-end, voici un nouvel article présentant une technique pour lire le contenu d'un dump de lsass **à distance**, évitant ainsi la détection des AV (
#mimikatz) et le téléchargement de dumps volumineux (80-150Mo). Bon week-end !
https://beta.hackndo.com/remote-lass-dump-passwords/ … -
Impersonating Office 365 Users With
#Mimikatz (2017) https://www.dsinternals.com/en/impersonating-office-365-users-mimikatz/ … -
done! PowerSploit -> Invoke-Mimikatz is now fixed on Win10 ver 1903 build 18362 here is the pull request / working script https://github.com/PowerShellMafia/PowerSploit/pull/336 …
#mimikatz@gentilkiwi@harmj0ypic.twitter.com/QjLXTVWKkE
-
I am a VERY lucky guy! I have 150 of my friends join me for my BDay conference in Helsinki! People from 20 countries flew in! Now we have the creator of
#mimikatz @gentilkiwi presenting!#honored#samilaiho40#mvpbuzzpic.twitter.com/yH1ephYnVT
-
Attending
@Carlos_Perez course about#mimikatz &#kekeo? Need REAL smart card to play with PKI? This is how you can transform a cheap javacard into a 50$ smart card. In production for 3 years Demo from raw card to smart card login. Project: https://github.com/vletoux/GidsApplet … cc:@gentilkiwipic.twitter.com/hq6NBI82eK -
PingCastle - Get Active Directory Security At 80% In 20% Of The Time http://j.mp/2QbgCZc
#ActiveDirectory#CommandLine#mimikatz pic.twitter.com/m8oCu4aU9W
-
I have to remeber to keep at least one of these for myself
#mimikatz pic.twitter.com/1bsfYDac6u
-
#trickbot#wormshare spreader module v2#mimikatz#eternalromance *Unpacked: https://app.any.run/tasks/c3ad47e5-1af3-4f83-b012-c787eff61f30 … *Pdb: d:\MyProjects\spreader.v2\REXE\tin_x86.pdb *From sample: https://app.any.run/tasks/9fa6e06c-8b79-4966-b861-d44e1e131ad2 … (https://urlhaus.abuse.ch/url/226178/ ) *Refs: -https://www.vkremez.com/2017/09/lets-learn-reversing-trickbot-banking.html … -http://plok1.blogspot.com/2018/02/a-new-spreader-with-mimikatz.html …pic.twitter.com/EtLlnXchb8
-
Created a copy of the MsMpEng.exe (Windows Defender Antimalware Service), renamed it to 'Invoke-Mimikatz', and Windows Defender is now a "Trojan". Defender doesn't like seeing Invoke-Mimikatz in a command line. Even the signed Defender executable isn't safe. Beware the
#mimikatz. pic.twitter.com/nQ4sEgka4h
Prikaži ovu nit -
I have changed my computer name to Invoke-Mimikatz for a joke, and was wondering why my git was acting up and i couldn't clone a repository.
#infosec#mimikatz#security#cybersecurity#Windows#Microsoft pic.twitter.com/QQ6AAqHMub
Prikaži ovu nit
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.