Lateral Movement – Pass-the-Hash Attacks

In this post we will take a look A LOT of tools and techniques that can be used to perform a pass-the-hash attack. First, we will dump the local SAM file hashes off our initial victim and extract the local administrator account’s hash. From there, we will use the local administrator hash to move laterally … Continue reading Lateral Movement – Pass-the-Hash Attacks