Pass the Hash / Password
!!! NTLMv2 hashes can not be passed !!!
only NTLM hashes can be passed
FOR TOOLS THAT HAVE TO USE LM HASHES BEFORE NTLM HASH, ADD A BLANK LM HASH:
aad3b435b51404eeaad3b435b51404ee
We can pass hashes which are from: SAM Files, LSASS, NTDS.DIT
We can pass hashes between workgroup machines, domain members and domain controllers.
Remote
Pass the hash remotely to gain a shell:
pth-winexe
Sometimes you may need to reference the target by its hostname (add an entry to /etc/hosts to make it resolve):
Alternative:
remember the first hash portion is a blank LM hash between these signs : and %
secretsdump
psexec.py / winexec.py
metasploit psexec
Local
Pass the hash locally using runas:
Pass the hash locally using PowerShell:
Pass the hash locally using psexec:
pass the hash with mimikatz:
Last updated