Available when NTLM is being used for authentication.
NTLM is a single sing-on method that uses a challenge response protocol to verify the user’s identity without having to need a password.
NTLM is still used pretty often since other systems are already using it for authenticatioin.
PtH Windows
Mimkatz
sekurlsa::pth
module can be used for PtH.
We need:
/user
: Username we want to impersonate
/rc4
or /NTLM
: NTLM hash of found password
/domain
: Domain the target user belongs to. If we are using local user account, we can use computer name, localhost, or a dot.
/run
: Program we want to run. Default is cmd.exe
Invoke-TheHash
https://github.com/Kevin-Robertson/Invoke-TheHash
Powershell.
We can use either SMB or WMI.
We need:
Target
: Hostname or IP address
Username
: Username to use for authentication
Domain
: Unnecessary if local account
Hash
: NTLM password hash
Command
: Default is WMI
Following command use SMB method for command execution and create a new user and add it to the Administrators group.
PtH Linux
On Linux, we can use impacket’s psexec, atexec, and smbexec.
Impacket PsExec
Crackmapexec
If we want to try for local user, use --local-auth
flag.
Evil-Winrm
RDP