cache
Last updated
Last updated
lsadump::cache
can be used to enumerate Domain Cached Credentials from registry. It does so by acquiring the SysKey
to decrypt NL$KM
(binary protected value) and then MSCache(v1/v2)
.
The registry key for the Domain Cached Credentials is HKEY_LOCAL_MACHINE\SECURITY\Cache
The number of cached entries is defined in CachedLogonCount
in HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
It has the following command line arguments:
/sam
: the SAM hive
/system
: The SYSTEM hive
/security
: The SECURITY hive
/user
: An existing username to modify the cached credentials
/password
: The new password of the specified user
/dcc
: The MS-Cache hash to be replaced
/ntlm
: The NTLM hash which will calculate the MS-Cache
/kiwi
: which modifies the user's cached password to mimikatz
/subject
: The subject's certificate name. This name must conform to the X.500 standard. The simplest method is to specify the name in double quotes, preceded by CN=
(e.g. CN=myName
) ().
This command requires elevated privileges (by previously running or by executing Mimikatz as the NT-AUTHORITY\SYSTEM
account).
/kiwi
When changing the cached password for a user, all the related DPAPI data will be affected.
/ntlm