Lateral movement
Pass-the-Hash (PtH)
Why: Reuse a dumped NTLM hash to authenticate as that user.
Requires NTLM hash (usually from LSASS/secretsdump)
Used to pivot to other systems via SMB, WMI, WinRM
Pass-the-Ticket (PtT)
Why: Reuse .kirbi
ticket to impersonate user on other machines.
Requires extracted Kerberos TGT or TGS from memory
Works on services supporting Kerberos (e.g., SMB, LDAP)
Overpass-the-Hash (Pass-the-Key)
Why: Use NTLM hash to request a fresh TGT.
Requires NTLM hash and domain context
Enables Kerberos-auth to lateral targets
WMExec / PSExec / WinRM
Why: Shell access on remote machine using valid creds/hash.
Requires admin or RDP/WMI access
Establishes interactive shell to move deeper
Session Hijacking
Why: Find where privileged users are logged in to pivot further.
Requires net session/logon rights (often local admin)
Lets you target high-priv endpoints for lateral escalation
RDP Pivot
Why: Direct GUI access to another host.
Requires RDP enabled & credentials
Convenient for interacting with GUI-only targets
WMI Event Subscription or Scripting Abuse
Why: Execute code remotely via WMI.
Needs valid creds with remote WMI access
Useful when PsExec/SMB blocked
Last updated
Was this helpful?