Concerned About Your Business Cyber Security?

(877) 321--7374

Mitigations against Mimikatz Style Attacks, (Tue, Feb 5th)

If you are like me, at some point in most penetration tests you’ll have a session on a Windows host, and you’ll have an opportunity to dump Windows credentials from that host, usually using Mimikatz.  Mimikatz parses credentials (either clear-text or hashes) out of the LSASS process, or at least that’s where it started – since it’s original version back in the day, it has expanded to cover several different attack vectors.  An attacker can then use these credentials to “pivot” to attack other resources in the network – this is commonly called “lateral movement”, though in many cases you’re actually walking “up the tree” to ever-more-valuable targets in the infrastructure.

Ready For ASuperheroI.T. Solution?

Real Time Web Analytics