backupkeys
lsadump::backupkeys
dumps the DPAPI backup keys from the Domain Controller (cf. dumping DPAPI secrets). By holding the backup keys any user's master key can be decrypted and as a result the users' secrets can be decrypted. It has the following command line arguments:
/export
: export the output as.pvk
which means "private key"/secret
: at the time of writing, November 1st 2021, we don't know what this option refers to/system
: the target DC hostname/guid
: TheszGuid
value. It can be found atC:\Users\<username>\AppData\Roaming\Microsoft\Credentials
,C:\Users\<username>\AppData\Local\Microsoft\Credentials
andC:\Users\<username>\AppData\Roaming\Microsoft\Protect\SID
. It can also be obtained with sekurlsa::dpapi
This command requires elevated privileges (by previously running privilege::debug or by executing Mimikatz as the NT-AUTHORITY\SYSTEM
account).
Last updated