Skip to content

darkoperator/mimikatz-missing-manual

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

18 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

The Mimikatz Missing Manual Logo

The Mimikatz Missing Manual

The definitive guide to Windows Identity, Kerberos, and PKI Research.

Originally developed as a private, high-end training curriculum for security conferences, this material is now being released to the public. Much of the technical depth and internal logic documented here was refined with the direct help and insight of Benjamin Delpy, the author of Mimikatz.

About This Manual

This project transitions years of instructor-led material into a self-paced, deep-dive manual. It explains not just the commands, but the why and the how of the Windows protocols being manipulated.

It is designed for:

  • Red Teams: Detailed command references and operational tradecraft.
  • Blue Teams: Detection strategies, event log signatures, and mitigation guides.
  • Security Researchers: A master class in Windows Security Authority (LSA) internals.

You can access the online version of the manual at Github Page

Structure

The manual is organized into seven logical parts:

  1. Foundations: Setup, architecture, and basic modules.
  2. System Internals: Tokens, processes, services, and RPC.
  3. LSASS & Credentials: Dumping secrets, patching memory, and kernel-level access.
  4. Kerberos Deep Dive: Tickets, forgery, roasting, and delegation.
  5. PKI & Certificates: Hardware (Smart Cards) and software-based identity abuse.
  6. Domain Persistence: DCSync, NetSync, and the DCShadow rogue DC attack.
  7. DPAPI: Unlocking data at rest, master keys, and backup keys.

Getting Started

The manual is best viewed as a GitHub Pages site.

If you are running it locally:

  1. Install the requirements: pip install mkdocs-material
  2. Serve the site: mkdocs serve
  3. Navigate to http://localhost:8000

Disclaimer

This material is provided for educational and authorized security testing purposes only. Unauthorized access to computer systems is illegal. Always ensure you have explicit permission before conducting security assessments.

— Carlos Perez (DarkOperator)

About

The Mimikatz Missing Manual

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages