Overpass the Hash
In comparison to Passing the Hash, where we take a user's NTLM hash and authenticate via NTLM, we take the NTLM and use it to give ourselves a Kerberos TGT which can then allow us to access another service or machine as that user.
This lateral movement technique can be especially useful in environments where NTLM authentication is not allowed.
With the hash of a user we can use Overpass the Hash to authenticate to any machine or service where the user has permissions to use.
Steps
Step 1 - Obtain Hashes of Your Target User
Step 2 - Overpassing the Hash
Mimikatz
Can also do it with Rubeus.exe (no Admin rights necessary)
From Linux
Last updated