Password dumping with mimipenguin
Mimipenguin
is based on the very popular password-cracking tool mimikatz. Much like swap_digger
, mimipenguin
can also retrieve artifacts running in memory by dumping memory processes that may contain unencrypted passwords in plaintext:
- Let's start by changing to the
Desktop
folder and then cloningmimipenguin
to desktop by typinggit clone
into a new Terminal: - Change to the
mimipenguin
directory by typing incd mimipenguin
, then show the files within by typing inls
: - Run
mimipenguin
by typing in./mimipenguin
:
In the previous screenshot, we can see that the username and password for the Kali machine was discovered (root : toor
).