Pass the Hash

We can use the password or hash to move literally in the network.

Complete Tutorial

How to get the hash

Metasploit Hashdump

Impacket

Crackmapexec PTH

We can pass a password and sweep the subnet

or We can also pass a hash (Works only on NTLM v1 . V2 can be relayed not passed)

add --local-auth as we are authenticating locally

Capabilities of crackmapexec

We can dump SAM, LSA or smbshares

Dumping Memory

🔍 --lsa in CrackMapExec

Purpose: Dumps LSA secrets from the registry, such as:

  • Stored service account passwords

  • Cached domain credentials

  • Auto-logon passwords

  • Scheduled task creds

Mechanism: This is a registry read, not a memory dump. It does not touch LSASS directly.

Command Example:

Requires:

  • Administrator privileges

  • Access to registry remotely

Output Example:


🧠 -M lsassy Module

Purpose: Dumps live credentials from LSASS memory, including:

  • Cleartext passwords

  • NTLM hashes

  • Kerberos tickets

Mechanism: Runs a memory dump using a method like procdump, comsvcs, or nanodump, then parses it using lsassy.

Command Example:

Requires:

  • Administrator privileges

  • Ability to execute dump remotely

  • AV/EDR may block it

Output Example:

CrackMapExec database

Keeps record of all cracked user accounts

Dumping Hashes

Secrets Dump

Dumps SAM as well as other secrets from registry

Secrets Dump from Hash

Pass the Hash with Mimikatz

Last updated