Aside from those, it is also included in a number of other popular post-exploitation frameworks and tools such as Metasploit, Cobalt Strike, Empire, PowerSploit and similar. The official builds are still maintained and hosted on GitHub, with the current version being 2.2.0 20190813 at the time of writing. Not only that, but mimikatz has, over the years, become commoditized, expanded and improved upon in a number of ways. So why are we writing about mimikatz today? Quite simply because it still works. The mimikatz tool was first developed in 2007 by Benjamin Delpy. #BLOCK STRIKE HACK TOOL HOW TO#In this post, we take a look at what mimikatz is, how it is used, why it still works, and how to successfully protect endpoints against it. Now, what if we told you it was FREE and already built into many of your favorite tools and malware campaigns/kits/frameworks? Sounds exciting right!?īut then you probably already know that this is no wish list or some private NSA hacking tool, but the well-established mimikatz post-exploitation tool. What if we were to tell you that there was a magical tool that could greatly simplify the discovery and pillaging of credentials from Windows-based hosts? This tool would be a welcome addition to any criminal’s toolbelt, as it would also be for pentesters, Red Teamers, black hats, white hats, indeed anyone interested in compromising computer security.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |