mimikatz how to use for recovering Windows administrator password in plain text.

mimikatz is a tool made inĀ C and It's now well known to extract plaintexts passwords, hash, PIN code and kerberos tickets from memory. mimikatz can also perform pass-the-hash, pass-the-ticket or build Golden tickets.

Download MimiKatz Here

Quick usage:

1. privilege::debug
Tests to make sure you have the right user level permissions for mimikatz to run.

2. sekurlsa::logonpasswords
Since the Windows Admin password is stored in the memory the command above will dump the logged in Admin's password in plaintext.

Please, take in mind that mimikatz will only work if the Admin is already logged in to the machine however mimikatz in metasploit can be used together when used in a MITM attack and or with a rubber ducky
FreeCST wanted to give everyone an understanding on how mimikatz could be used, personally I've never tested mimikatz on a Windows local domain so places like school computers and possibly most office computers that use something like a local domain may or may not work with mimikatz.

Password Attacks, Training