401 Class 42: Pass the Hash with Mimikatz - nataliabdallah/codefellows-ops-reading-notes GitHub Wiki

Home | README.md | Portfolio | |

Reading What is Mimikatz?

Name the six credential-gathering techniques which Mimikatz is able to perform and explain how two of them work.

What are four ways we can defend against Mimikatz attacks. Explain how two of the mitigations can stop Mimikatz.

  1. By using the principle of least privilege, then you can mitigate an attacker having access to systems
  2. Turning off debugging privileges would fall under the same principle and is necessary since Mimikatz can exploit this debugging privilege.