Pass-the-Hash (PtH) Attacks
Once you have dumped (or otherwise obtained) Windows NTLM hashes, you can use these in an attack known as Pass-the-Hash (PtH). It abuses the NTLM authentication protocol to authenticate as the user with just knowing the hash.
Meterpreter
Last updated