{"id":4202,"date":"2016-09-30T22:45:42","date_gmt":"2016-09-30T14:45:42","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=4202"},"modified":"2016-10-01T13:04:40","modified_gmt":"2016-10-01T05:04:40","slug":"mimikittenz-extract-plain-text-passwords-memory","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2016\/09\/mimikittenz-extract-plain-text-passwords-memory\/","title":{"rendered":"mimikittenz – Extract Plain-Text Passwords From Memory"},"content":{"rendered":"

mimikittenz is a post-exploitation powershell tool that utilizes the Windows function ReadProcessMemory() in order to extract plain-text passwords from various target processes.<\/p>\n

\"mimikittenz<\/p>\n

The aim of mimikittenz is to provide user-level (non-admin privileged) sensitive data extraction in order to maximise post exploitation efforts and increase value of information gathered per target.<\/p>\n

NOTE<\/strong><\/em>: This tool is targeting running process memory address space, once a process is killed it’s memory ‘should’ be cleaned up and inaccessible however there are some edge cases in which this does not happen.<\/p>\n

Features<\/h3>\n

Currently mimikittenz is able to extract the following credentials from memory:<\/p>\n