An attacker obtains the password hashes of one or more users on a computer network using various channels. Using Mimikatz the attacker leverages the compromised user’s username and password hash to authenticate to other systems that account has access to, in this case a domain controller.
Mimikatz github.com/gen...
PStools docs.microsoft...
DSInternals Powershell Module www.dsinternal...
22 окт 2024