Many websites nowadays store users passwords in website logs for the ease of the
What is Mimikatz :
Mimikatz is a tool designed and built to play with the windows security. It is included
This is the level 1 attack of this tool or script when it comes as a program. The level 2 is the interesting one i.e why only a pc with Windows os but also the Windows servers in which some websites get hosted.
The idea of collaging the use of mimikatz script with a jpg image file using Windows powershell is the main objective of this scene.For this to happen , first of all we have to embed the script In the image file.
Is it possible to embed a script on a image file ?
So it is recommendable to choose
You need another script in the form of power shell to embed the
Open the windows powershell in your pc as an administrator, if not you will get a running script disabled error.
Store the given two scripts in a directory from where you can access as an administrator ( mostly in c drive)
Import the script Invoke-PSImage from the directory to PS(power shell) .
If an running script disable error occurs type,
Set-Execution policy unrestricted
Import the mimikatz script from the directory and embed it in a jpg file and name the resultant file in a png format.
PS>Import-Module .\Invoke-PSImage.ps1 –Script .\Invoke-Mimikatz.ps1 –Image .\empty.jpg –Out .\evil.png
The output evil.png is now embedded with the malicious script which will dump passwords from a windows server’s logs.
Host the image in the web and use the URL of the image to begin the attack wherever you find a website hosting on a windows server.