Pass the Hash (PtH)

June 10, 2024

Administrator:30B3783CE2ABF1AF70F77D0660CF3453
impacket-psexec Administrator@10.129.74.50 -hashes :30B3783CE2ABF1AF70F77D0660CF3453

First we have to enable the pass the hash method to the machine via evil-winrm

As we enable the passthehach technique we can now use xfreerdp to rdp into the machine

`

Then we will just use pypykatz to view our lsass.dmp

As we enter the command below it will execute the mimikatz and it will spawn up a new cmd for us

Now we can read the david .txt as david user which is possible via PTH

Now we will run the exact command but as julio user

We get the ntlm hash from the pypykatz earlier so will be using that in mimikatz

Now we can read the julio.txt using this method

First we need to make a reverse shell for our machine

Attacker Machine IP / MS01 - 172.16.1.05

Victim Machine IP / DC01 - 172.16.1.10

Then we will just open up a cmd as administrator and use it as powershell

Last updated