How to do it…

Following are the steps to use mimikatz: 

  1. Once we have the meterpreter and system privileges, we load up mimikatz using this command:
      load mimikatz
  1. To view all the options, we type this command:
      help mimikatz
  1. Now in order to retrieve passwords from the memory, we use the built-in command of Metasploit:
      msv
  1. We can see that the NTLM hashes are shown on the screen. To view Kerberos credentials, we type this:
      kerberos

If there were any credentials, they would have been shown here.