Password hash dump and reuse
Local logon password dump
mimikatz.exe (need high integrity)
dump from memory LSASS
dump from SAM
crack
CME dump hashes remotely (with local admin creds/hash)
Impacket dump all user password from SAM
victim
kali
with admin creds can dump from kali remote
alt
Domain password dump
/user:target e.g. built-in domain admin acct Administrator; or /all
Check where the credentials can be used
CME PtH for rev
NTLM PtH with local Administrator / AD user (not applicable to kerberos)
NTLM -> TGT Overpass the hash - gain tickets as specific users (other logoned local admin)
No SMB Winrm
Last updated
