Metasploit-framework: Mimikatz Update

Created on 16 Aug 2018  Â·  10Comments  Â·  Source: rapid7/metasploit-framework

Is there an easy way to upgrade the version of Mimikatz inside that is within Meterpreter?
I noticed a new version has been released:

https://github.com/gentilkiwi/mimikatz/releases/tag/2.1.1-20180814

This section should also tell us any relevant information about the
environment; for example, if an exploit that used to work is failing,
tell us the victim operating system and service versions.

Expected behavior

Mimikatz _should _ run against Windows 10 1803

Current behavior

Mimikatz does not work against these builds.

What happens instead?

Mimikatz throws various errors

System stuff

4 GB Memory / 80 GB Disk

Metasploit version

Framework: 4.17.3-dev
Console : 4.17.3-dev

I installed Metasploit with:

  • [ ] Kali package via apt
  • [ ] Omnibus installer (nightly)
  • [ X ] Commercial/Community installer (from http://www.rapid7.com/products/metasploit/download.jsp)
  • [ ] Source install (please specify ruby version)

OS

Distributor ID: Ubuntu
Description: Ubuntu 18.04.1 LTS
Release: 18.04
Codename: bionic

Most helpful comment

The easy way is for me to update it.

Patience friend!

On Thu., 16 Aug. 2018, 22:58 Click Bait Cake, notifications@github.com
wrote:

Is there an easy way to upgrade the version of Mimikatz inside that is
within Meterpreter?
I noticed a new version has been released:

https://github.com/gentilkiwi/mimikatz/releases/tag/2.1.1-20180814

This section should also tell us any relevant information about the
environment; for example, if an exploit that used to work is failing,
tell us the victim operating system and service versions.
Expected behavior

Mimikatz _should _ run against Windows 10 1803
Current behavior

Mimikatz does not work against these builds.

What happens instead?

Mimikatz throws various errors
System stuff

4 GB Memory / 80 GB Disk
Metasploit version

Framework: 4.17.3-dev
Console : 4.17.3-dev
I installed Metasploit with:

  • Kali package via apt
  • Omnibus installer (nightly)
  • [ X ] Commercial/Community installer (from
    http://www.rapid7.com/products/metasploit/download.jsp)
  • Source install (please specify ruby version)

OS

Distributor ID: Ubuntu
Description: Ubuntu 18.04.1 LTS
Release: 18.04
Codename: bionic

—
You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub
https://github.com/rapid7/metasploit-framework/issues/10468, or mute
the thread
https://github.com/notifications/unsubscribe-auth/AABw4K4lD8mR72lPgZpQzF1H0H1x6V_1ks5uRWxfgaJpZM4V_zod
.

All 10 comments

The easy way is for me to update it.

Patience friend!

On Thu., 16 Aug. 2018, 22:58 Click Bait Cake, notifications@github.com
wrote:

Is there an easy way to upgrade the version of Mimikatz inside that is
within Meterpreter?
I noticed a new version has been released:

https://github.com/gentilkiwi/mimikatz/releases/tag/2.1.1-20180814

This section should also tell us any relevant information about the
environment; for example, if an exploit that used to work is failing,
tell us the victim operating system and service versions.
Expected behavior

Mimikatz _should _ run against Windows 10 1803
Current behavior

Mimikatz does not work against these builds.

What happens instead?

Mimikatz throws various errors
System stuff

4 GB Memory / 80 GB Disk
Metasploit version

Framework: 4.17.3-dev
Console : 4.17.3-dev
I installed Metasploit with:

  • Kali package via apt
  • Omnibus installer (nightly)
  • [ X ] Commercial/Community installer (from
    http://www.rapid7.com/products/metasploit/download.jsp)
  • Source install (please specify ruby version)

OS

Distributor ID: Ubuntu
Description: Ubuntu 18.04.1 LTS
Release: 18.04
Codename: bionic

—
You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub
https://github.com/rapid7/metasploit-framework/issues/10468, or mute
the thread
https://github.com/notifications/unsubscribe-auth/AABw4K4lD8mR72lPgZpQzF1H0H1x6V_1ks5uRWxfgaJpZM4V_zod
.

BTW, are you using the mimikatz extension, or the kiwi extension? Because you should be using the latter, not the former, on Windows 10.

update landed https://github.com/rapid7/metasploit-payloads/pull/296 so if you pull msf5 it should work for you

Sorry for not being patient, I was wondering if there was a way to pull the latest Mimikatz in without a full MSF update. I also wasn’t sure how long it would take to get into MSF.

Thanks for looking so promptly!

that cannot be done without the change to the meterpreter extension (which could probably be automated to ease this), you can still always run mimikatz as standalone executable or embed it in some other script that would allow you to bypass AV products.

Okay thanks for the info. I have been trying to use the -H (I think H) flag to inject the code right into memory but had limited success. Will try again once the version you linked is added to Meterpreter. Looks like there is some useful RDP manager credential harvesting....

More questions; How do I go about Pulling MSF5?

The way I do it is clone the main branch and then follow https://github.com/rapid7/metasploit-framework/wiki/Setting-Up-a-Metasploit-Development-Environment to install correct dependencies (base dev packages and ruby).

It would be cool if the folks here could create a easy way to install the bleeding edge version for beginners like myself!

Was this page helpful?
0 / 5 - 0 ratings