Lateral Movement
Lateral movement is how attackers pivot through a network after compromising a single host, using valid credentials or tokens to access other systems and expand control.
WMI & WinRM
Uses built-in Windows remote management tools to execute commands on remote machines. Requires administrative privileges on the target, and services must be enabled. WinRM typically communicates over HTTP/S (ports 5985
/5986
), while WMI uses DCOM over port 135
.
PsExec
A Microsoft tool that remotely launches processes via SMB and the Service Control Manager. Requires SMB (port 445
), the ADMIN$
share, and admin rights on the target. Often used for direct remote shell access.
Pass-the-Hash
Reuses a stolen NTLM hash to authenticate without knowing the actual password. Works only with NTLM-authenticated services like SMB and requires admin rights and access to shares. It enables remote code execution via tools like wmiexec
or psexec
.
Overpass-the-Hash
Converts an NTLM hash into a Kerberos TGT, letting attackers authenticate to Kerberos services without using NTLM. Tools like mimikatz
inject the hash into memory, allowing access to RDP, WinRM, or PsExec using Kerberos instead of hashes.
Pass-the-Ticket
Involves stealing and injecting Kerberos TGS tickets, allowing access to specific services as another user. TGS tickets can be reused across systems, even without admin rights, if already present in memory.
DCOM
Executes remote commands by instantiating COM objects on a target machine. Admin privileges are needed, but it’s stealthy—no files are written to disk.
Last updated
Was this helpful?