• We just launched and are currently in beta. Join us as we build and grow the community.

Hack the Password in Plain text of Remote Windows PC

molex823

Shonen Battle Strategist
M Rep
0
0
0
Rep
0
M Vouches
0
0
0
Vouches
0
Posts
154
Likes
140
Bits
2 MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1 400 XP
Today we will learn how to extract login credentials from a victim, who is running a Windows System. Using this technique, we can see the Credentials in plain text.

Table of Content:
  • Introduction to Mimikatz
  • Achieve Meterpreter on Remote System
  • Loading Kiwi Module
  • Extracting Credentials

Introduction to Mimikatz

Mimikatz is a tool made by Benjamin Delpy on C. It’s now well known to extract plaintexts passwords, hash, PIN code and Kerberos tickets from memory. Mimikatz can also perform pass-the-hash, pass-the-ticket or build Golden tickets.

Fortunately, Metasploit decided to include Mimikatz as a meterpreter script to allow for easy access to its full set of features without needing to upload any files to the disk of the compromised host.

Requirements

Attacker: Kali Linux

Targets: Windows OS

Open Kali Linux terminal and type msfconsole in order to load Metasploit framework. Now we need to compromise victim’s machine once to achieve any type of session either meterpreter or shell and to do so we can read our previous article from here. Now to make Post Exploitation, we will need an Administrator Privileged shell, which can be found here.

We successfully got an Administrator Privileged Shell of the remote system now we will proceed towards retrieving the passwords. We can use the following command to load themimikatzscript into the current Metasploit session.

Code:
meterpreter > load kiwi

After running the above command, we got the features of mimikatz, that are not normally present in the Metasploit Framework. As our target in this article is to extract the saved credentials, we will run the following command. This command i.e., creds_all will do this job for us.

Code:
meterpreter > creds_all

7.png
 

435,417

313,890

313,899

Top