In a recent 7MS episode (https://7ms.us/7ms-455-tales-of-inte...pwnage-part-24/) I admitted how I really hadn't done my homework with Mimikatz and PTT, assuming Mimikatz's effectiveness was limited since EDRs were so good and catching it on disk. It wasn't until taking CRTP (https://7ms.us/tag/crtp/) with Gh0stHax that I realized how powerful and sneaky it can be by using it in combination with PS remoting. Now that I've had a chance to use CRTP skills on some new pentests, I have to say:
1. Boy, was I doing a lot of phases of a test the haaaaaard way when I didn't need to
2. It feels just downright wrong to find an NTLM hash (using lsassy, secretsdump, etc.) and then be able to fire up mimikatz.exe and do this:
Once you do, bam! you get a new cmd.exe window with domain administrator privileges. Pair your new powers with something like this for even more fun:
Poof! You've popped a new cmd.exe on VICTIM-SERVER with DA rights!
This has gotten me even more interested in the blue team side of things, and in the lab I'm trying to better understand additional layers of controls that can be built in to AD, etc. to keep these hashes out of evil hands!
1. Boy, was I doing a lot of phases of a test the haaaaaard way when I didn't need to
2. It feels just downright wrong to find an NTLM hash (using lsassy, secretsdump, etc.) and then be able to fire up mimikatz.exe and do this:
Code:
sekurlsa::pth /user:administrator /ntlm:hash-of-the-administrator-user /domain:yourdomain.com
Code:
psexec \\VICTIM-SERVER cmd.exe
This has gotten me even more interested in the blue team side of things, and in the lab I'm trying to better understand additional layers of controls that can be built in to AD, etc. to keep these hashes out of evil hands!

Comment