Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 682

Mimikatz

What is Mimikatz?

MimikatzAn open-source Windows post-exploitation tool that extracts plaintext passwords, hashes, Kerberos tickets, and other credentials from memory and LSASS.


Mimikatz is a credential-access tool created by Benjamin Delpy (gentilkiwi) to demonstrate fundamental Windows authentication weaknesses, particularly in LSASS memory and the SSPI providers (WDigest, Tspkg, Kerberos, MSV). It can dump credentials, forge Kerberos Golden and Silver tickets, perform pass-the-hash and pass-the-ticket, and manipulate certificates. While originally a research project, it became a staple of red-team toolkits and is heavily abused by ransomware actors after initial domain access. Modern Windows defenses (Credential Guard, LSA Protection, EDR, restricted admin mode, tiered administration) significantly reduce its impact, but it remains an essential benchmark for detection engineering.

Examples

  1. 01

    Running sekurlsa::logonpasswords to dump credentials from an LSASS memory image.

  2. 02

    Forging a Golden Ticket with kerberos::golden after compromising the krbtgt account.

Frequently asked questions

What is Mimikatz?

An open-source Windows post-exploitation tool that extracts plaintext passwords, hashes, Kerberos tickets, and other credentials from memory and LSASS. It belongs to the Defense & Operations category of cybersecurity.

What does Mimikatz mean?

An open-source Windows post-exploitation tool that extracts plaintext passwords, hashes, Kerberos tickets, and other credentials from memory and LSASS.

How does Mimikatz work?

Mimikatz is a credential-access tool created by Benjamin Delpy (gentilkiwi) to demonstrate fundamental Windows authentication weaknesses, particularly in LSASS memory and the SSPI providers (WDigest, Tspkg, Kerberos, MSV). It can dump credentials, forge Kerberos Golden and Silver tickets, perform pass-the-hash and pass-the-ticket, and manipulate certificates. While originally a research project, it became a staple of red-team toolkits and is heavily abused by ransomware actors after initial domain access. Modern Windows defenses (Credential Guard, LSA Protection, EDR, restricted admin mode, tiered administration) significantly reduce its impact, but it remains an essential benchmark for detection engineering.

How do you defend against Mimikatz?

Defences for Mimikatz typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Mimikatz?

Common alternative names include: mimi, kekeo, Invoke-Mimikatz.

Related terms

See also