Pass the Hash (PtH)
June 10, 2024

Administrator:30B3783CE2ABF1AF70F77D0660CF3453impacket-psexec Administrator@10.129.74.50 -hashes :30B3783CE2ABF1AF70F77D0660CF3453
First we have to enable the pass the hash method to the machine via evil-winrm

As we enable the passthehach technique we can now use xfreerdp to rdp into the machine


Then we will just use pypykatz to view our lsass.dmp

As we enter the command below it will execute the mimikatz and it will spawn up a new cmd for us
Now we can read the david .txt as david user which is possible via PTH

Now we will run the exact command but as julio user
We get the ntlm hash from the pypykatz earlier so will be using that in mimikatz

Now we can read the julio.txt using this method

First we need to make a reverse shell for our machine

Attacker Machine IP / MS01 - 172.16.1.05
Victim Machine IP / DC01 - 172.16.1.10
Then we will just open up a cmd as administrator and use it as powershell







Last updated