cache
lsadump::cache
can be used to enumerate Domain Cached Credentials from registry. It does so by acquiring the SysKey
to decrypt NL$KM
(binary protected value) and then MSCache(v1/v2)
.
The registry key for the Domain Cached Credentials is HKEY_LOCAL_MACHINE\SECURITY\Cache
The number of cached entries is defined in CachedLogonCount
in HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
It has the following command line arguments:
/sam
: the SAM hive/system
: The SYSTEM hive/security
: The SECURITY hive/user
: An existing username to modify the cached credentials/password
: The new password of the specified user/dcc
: The MS-Cache hash to be replaced/ntlm
: The NTLM hash which will calculate the MS-Cache/kiwi
: Undocumented parameter which modifies the user's cached password to mimikatz/subject
: The subject's certificate name. This name must conform to the X.500 standard. The simplest method is to specify the name in double quotes, preceded byCN=
(e.g.CN=myName
) (more info).
LM and NT hashes are used to authenticate accounts using the NTLM protocol. These hashes are often called NTLM hash and many documentations, resources, blogpost and tools mix terms. In this case, "ntlm" refers to the NT hash.
This command requires elevated privileges (by previously running privilege::debug or by executing Mimikatz as the NT-AUTHORITY\SYSTEM
account).
Modify a DCC with /kiwi
/kiwi
When changing the cached password for a user, all the related DPAPI data will be affected.
Modify a DCC with /ntlm
/ntlm
Last updated