Skip to content

Latest commit

 

History

History
55 lines (25 loc) · 2.27 KB

File metadata and controls

55 lines (25 loc) · 2.27 KB

eKeys

Executes Mimikatz's sekurlsa::ekeys on each target system to retrieve Kerberos encryption keys.

For each system output is stored in $pwd\PME\eKeys\

Supported Methods

  • MSSQL
  • SMB
  • SessionHunter (WMI)
  • WMI
  • WinRM

Optional Parameters

ParameterValueDescription
-NoParseN/AIf specified, PsMapexec will not automatically parse output from all targets systems and identify accounts that belong to privileged groups.
-ShowOutputN/ADisplays each targets output to the console
-SuccessOnlyN/ADisplay only successful results

Usage

{% code overflow="wrap" %}

# Standard execution
PsMapExec -Username [User] -Password [Pass] -targets [All] -Module eKeys -Method [Method] -ShowOutput

{% endcode %}

Parsing

If -NoParse is not specified,, PsMapExec will parse the results from each system and present the results in a digestable and readable format. The notes field will highlight in yellow any interesting information about each result.

The table below shows the possible values for the notes field.

ValueDescription
AdminCount=1The parsed account has an AdminCount value of 1. This means the account may hold some sort of privileged access within the domain.
rc4_hmac_nt=Empty PasswordThe rc4 value is equal to that of an empty password.
Cleartext PasswordCleartext password was parsed from the results. This is only highlited on user accounts and omitted for computer accounts.
Domain Admin
Enterprise Admin
Server Operator
Account Operator
The account is a member of a high value group.

f