Pass The Hash attack
Pass the hash attack: Using to privilege escalation. After you had hash password ( via exploit browser, file format etc, you can access sam file, or using fgdump)
You can use hash password to login smb, using psexe. Now you can login with other account, etc Administrator. So from normal user like limited user, you became Administrator:
------------------------------------------------------------
Thanks for reading
--------------------------------------------------------------------------
Security Research
All my Lab:
Linux Lab -- window and Cisco Lab
to be continued - I will update more.
Nam Habach