We may earn an affiliate commission when you visit our partners.
Course image
Lee Allen
Would you like to be able to see clear text credentials stored in memory? How about harvesting clear text credentials stored in protected files? In this course, Credential Access with Mimikatz, you will learn how to leverage the advanced credential access capabilities of the open-source Mimikatz project towards post-exploitation activities. First, you will see how to harvest password hashes and clear text user names and passwords for active login sessions stored in system memory. Next, you will discover how Mimikatz can be used to open memory dumps from other systems for situations where you may not be able to run Mimikatz on the...
Read more
Would you like to be able to see clear text credentials stored in memory? How about harvesting clear text credentials stored in protected files? In this course, Credential Access with Mimikatz, you will learn how to leverage the advanced credential access capabilities of the open-source Mimikatz project towards post-exploitation activities. First, you will see how to harvest password hashes and clear text user names and passwords for active login sessions stored in system memory. Next, you will discover how Mimikatz can be used to open memory dumps from other systems for situations where you may not be able to run Mimikatz on the victim machine. Finally, you will explore how to obtain clear text usernames and passwords stored by browsers, changing domain user passwords on the fly, and capturing passwords to file. When you finished with this course, you will have the skills and knowledge of the open-source Mimikatz tool needed to emulate credential access techniques aligned with Mitre ATT&CK.
Enroll now

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Develops skills aligned with industry-standard Mitre ATT&CK, making it immediately applicable
Teaches advanced credential access capabilities of the sought-after Mimikatz tool for post-exploitation activities
Taught by recognized cybersecurity experts Lee Allen, indicating high-quality instruction
Suitable for professionals in cybersecurity, ethical hacking, or pentesting roles

Save this course

Save Credential Access with Mimikatz to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Credential Access with Mimikatz. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Credential Access with Mimikatz will develop knowledge and skills that may be useful to these careers:
Cyber Security Analyst
Cyber Security analysts design and implement network security measures to protect against threats, attacks, and unauthorized access. This course is invaluable for cyber security analysts. Mimikatz is a popular open-source tool which can be used to gain unauthorized access to credentials and sensitive information on systems. Familiarity with this tool and how to properly mitigate potential exploits may be applicable to various security analyst positions. This course helps to build a foundation for this and teaches analysts how to leverage Mimikatz to access credentials during post-exploitation activities.
Security Architect
Security architects plan and implement the security infrastructure of an organization, including network security, access control, and disaster recovery. Familiarity with Mimikatz is valuable for security architects as it may be used by attackers as part of an attempt to bypass security controls and gain unauthorized access to a network. This course may be suitable for security architects who wish to maximize their knowledge of Mimikatz and its capabilities.
Forensic Analyst
Forensic analysts investigate computer systems to collect and preserve evidence for legal purposes. They are responsible for examining digital devices, extracting data, and providing reports on their findings. This course may be helpful for forensic analysts who wish to enhance their understanding of credential access and exploitation. Learning the capabilities of Mimikatz can help forensic analysts improve their ability to detect and investigate malicious activity.
Penetration Tester
Penetration testers are responsible for testing the security of computer systems, networks, and applications. They use a variety of tools and techniques to identify vulnerabilities that could be exploited by attackers. This course may be helpful for pen testers who wish to build their knowledge of credential access and exploitation using Mimikatz. Mimikatz is a valuable tool for penetration testers as it can be used to bypass security controls and gain unauthorized access to credentials.
Incident Responder
Incident responders are responsible for responding to and mitigating security incidents. They are responsible for investigating incidents, identifying the cause, and taking steps to prevent future incidents. This course may be beneficial for incident responders as it can provide them with the knowledge and skills needed to quickly and effectively respond to credential access and exploitation attacks.
SOC Analyst
Security Operations Center (SOC) analysts are responsible for monitoring and analyzing security logs and alerts to identify potential threats and incidents. They are responsible for triaging incidents, escalating them to the appropriate team, and taking steps to mitigate risks. This course may be valuable for SOC analysts as it can enhance their understanding of credential access and exploitation and enable them to detect and respond to these threats more effectively.
Cloud Security Engineer
Cloud security engineers are responsible for securing cloud computing environments. They are responsible for designing and implementing security controls, monitoring for threats, and responding to security incidents. This course may help build a foundation for cloud security engineers who need to understand credential access and exploitation in the context of cloud computing. As Mimikatz is a powerful tool that can be used to bypass security controls and gain unauthorized access to credentials in a cloud environment, this course can help cloud security engineers stay informed about potential threats and develop strategies to mitigate them.
Threat Intelligence Analyst
Threat intelligence analysts are responsible for collecting, analyzing, and disseminating information about security threats. They are responsible for identifying new threats, tracking their evolution, and providing guidance to organizations on how to protect themselves from these threats. This course may be helpful to threat intelligence analysts as it may provide insights into the techniques and tactics used by attackers to exploit credentials. Understanding credential access and exploitation can help threat intelligence analysts stay informed about the latest threats and develop strategies to mitigate them.
Malware Analyst
Malware analysts are responsible for analyzing malware to identify its functionality, behavior, and potential impact. They are responsible for developing detection and prevention strategies and providing guidance to organizations on how to protect themselves from malware. This course may be helpful for malware analysts as it can provide insights into how malware can exploit credentials and how to detect and prevent these attacks.
Application Security Engineer
Application security engineers are responsible for securing software applications. They are responsible for identifying and mitigating vulnerabilities in applications, and for developing secure coding practices. This course may be useful for application security engineers as it may help them to better understand the techniques and tactics used by attackers to exploit credentials in software applications. Enhancing their understanding of the capabilities of Mimikatz can help application security engineers to develop more secure applications and mitigate risks.
Vulnerability Researcher
Vulnerability researchers are responsible for identifying and reporting vulnerabilities in software and hardware. They are responsible for developing and testing exploits, and for providing guidance to vendors on how to fix vulnerabilities. This course may be helpful to vulnerability researchers as it may provide insights into how attackers can exploit credentials to gain unauthorized access to systems. Understanding credential access and exploitation can help vulnerability researchers develop more effective exploits and identify more vulnerabilities.
Network Security Engineer
Network security engineers are responsible for securing computer networks. They are responsible for designing and implementing network security controls, monitoring for threats, and responding to security incidents. This course may be helpful for network security engineers as it may provide insights into how attackers can exploit credentials to gain unauthorized access to networks. Understanding credential access and exploitation can help network security engineers develop more secure networks and mitigate risks.
Identity and Access Management (IAM) Architect
IAM architects are responsible for designing and implementing identity and access management systems. They are responsible for ensuring that users have the appropriate access to resources, and for protecting against unauthorized access. This course may be useful for IAM architects as it may provide insights into how attackers can exploit credentials to gain unauthorized access to systems. Understanding credential access and exploitation can help IAM architects develop more secure IAM systems and mitigate risks.
Security Consultant
Security consultants provide security advice and guidance to organizations. They are responsible for assessing security risks, developing security plans, and implementing security controls. This course may be helpful for security consultants as it may provide insights into how attackers can exploit credentials to gain unauthorized access to systems. Understanding credential access and exploitation can help security consultants develop more effective security plans and mitigate risks.
Cyber Security Manager
Cybersecurity managers are responsible for overseeing the security of an organization's computer systems and networks. They are responsible for developing and implementing security policies, and for ensuring that the organization is compliant with security regulations. This course may be helpful for cybersecurity managers as it may provide insights into how attackers can exploit credentials to gain unauthorized access to systems. Understanding credential access and exploitation can help cybersecurity managers develop more secure systems and mitigate risks.

Reading list

We haven't picked any books for this reading list yet.
Provides a detailed overview of memory forensics techniques, including how to detect and analyze malware using Mimikatz.
Provides a hands-on guide to malware analysis, including coverage of Mimikatz and its use in malware attacks.
Provides a hands-on approach to information security, including coverage of Mimikatz and its use in information security attacks.
Provides a hands-on approach to security testing, including coverage of Mimikatz and its use in security testing.
Provides a comprehensive overview of software exploitation, including coverage of Mimikatz and its use in software exploitation.
Provides a detailed overview of secure credential access for mobile devices, covering topics such as biometrics, PINs, and passwords. It valuable resource for anyone interested in learning more about this important topic.
Provides a unique case study approach to credential access management, covering topics such as identity management, access control, and security auditing. It valuable resource for anyone interested in learning more about this topic.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser