Lateral Movement – Pass-the-Hash Attacks
In this post we will take a look A LOT of tools and techniques that can be used to perform a pass-the-hash attack. First, we will dump the local SAM file hashes off our initial victim and extract the local administrator account’s hash. From there, we will use the local administrator hash to move laterally … Continue reading Lateral Movement – Pass-the-Hash Attacks
Copy and paste this URL into your WordPress site to embed
Copy and paste this code into your site to embed