Password dumping with MimiPenguin
The MimiPenguin
tool is based on the very popular password-cracking tool called Mimikatz. Much like swap_digger
, MimiPenguin
can also retrieve artifacts running in memory by dumping memory processes that may contain unencrypted passwords in plaintext, as shown in the following steps:
- Let’s start by changing to the
Desktop
folder from our current location, and then cloneMimiPenguin
to the desktop by typing the following into a new terminal:git clone https://github.com/huntergregal/mimipenguin
The following screenshot shows the output of the preceding command when installing MimiPenguin.

Figure 11.12 – Installing MimiPenguin
- Change to the
mimipenguin
directory by typingcd mimipenguin
and then show the files within by typingls
.
The following screenshot shows the output of the preceding ls
command.

Figure 11.13 – Viewing contents of the mimipenguin...