VulnHub might be a bit more popular than mimikatz. We know about 20 links to it since March 2021 and only 14 links to mimikatz. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.
Typically, Mimikatz is used to extract NTLM password hashes or Kerberos tickets from memory. However, one of its lesser-known capabilities is the ability to extract plaintext passwords from dumps created for the LSASS process. This means that an attacker can compromise plaintext passwords without running any nefarious code on domain controllers. Dump files can be created interactively or using ProcDump , and in... Source: over 1 year ago
Mimikatz can be used to perform pass-the-ticket, but in this post, we wanted to show how to execute the attack using another tool, Rubeus , lets you perform Kerberos based attacks. Rubeus is a C# toolset written by harmj0y and is based on the Kekeo project by Benjamin Delpy, the author of Mimikatz . Source: over 1 year ago
What is DCShadow? DCShadow is a command in the Mimikatz tool that enables an adversary to register a rogue domain controller and replicate malicious changes across the domain. Source: over 1 year ago
Mimikatz provides a variety of ways to extract and manipulate credentials, but one of the most alarming is the DCSync command. Using this command, an adversary can simulate the behavior of a domain controller and ask other domain controllers to replicate information — including user password data. In fact, attackers can get any account’s NTLM password hash or even its plaintext password, including the password... Source: over 1 year ago
Using Mimikatz , it is possible to leverage the password of the KRBTGT account to create forged Kerberos Ticket Granting Tickets (TGTs) which can be used to request Ticket Granting Server (TGS) tickets for any service on any computer in the domain. Source: over 1 year ago
You could take a look at something like (vulnhub)[https://vulnhub.com/]. They have a bunch of vms that are intentionally vulnerable. Source: about 1 year ago
Try looking on https://vulnhub.com/ (self hosted). Source: about 1 year ago
Https://vulnhub.com/ sounds like what you are lookin for. Source: about 1 year ago
You can go to vulnhub.com and download a lot of the vulnerable machines that you will find in platforms like TryHackMe, HackTheBox, etc. Source: about 1 year ago
Https://tryhackme.com, https://parrot-ctfs.com. https://vulnhub.com, https://vulnmachines.com, https://picoctfs.org there are quite a few awesome platforms out there I created https://parrot-ctfs.com in my free time its full of awesome labs created by various people its smaller but so worth the time. Source: over 1 year ago
Rapid7 - Find security issues, verify vulnerability mitigations & manage security assessments with Metasploit. Get the world's best penetration testing software now. DownloadPen testing software to act like an attacker.
TryHackMe - TryHackMe is an online platform for learning and teaching cyber security, all through your browser.
ZoomEye - Network mapping service
Hack The Box - An online platform to test and advance your skills in penetration testing and cyber security.
Exploit Pack - Exploit Pack is an open source project security that will help you adapt exploit codes on-the-fly.
PentesterLab - Learn all about web hacking through online courses spanning the basics to advanced vulnerabilities