WDigest
For the last decade Microsoft has disabled storing reversible passwords in memory by disabling the authentication provider that was leaking these credentials: WDigest.
We can easily enable it again by creating the UseLogonCredential registry key and assigning it the value of 1.
reg add HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest /v UseLogonCredential /t REG_DWORD /d 1
With WDigest enabled, the next time an account connects to the server, its password will be stored in a reversible format that Mimikatz can easily decrypt.
Last updated