Password dumping with mimipenguin
Mimipenguin
is based on the very popular password-cracking tool mimikatz. Much like swap_digger
, mimipenguin
can also retrieve artifacts running in memory by dumping memory processes that may contain unencrypted passwords in plaintext:
- Let's start by changing to the
Desktop
folder and then cloningmimipenguin
to desktop by typinggit clone
into a new Terminal:Figure 8.36 – Cloning mimipenguin onto the Kali Desktop
- Change to the
mimipenguin
directory by typing incd mimipenguin
, then show the files within by typing inls
:Figure 8.37 – Viewing the contents of the mimipenguin folder
- Run
mimipenguin
by typing in./mimipenguin
:
Figure 8.38 – Password discovery using mimipenguin in Kali Linux
In the previous screenshot, we can see that the username and password for the Kali machine was discovered (root : toor
).