-
Logon on another system with a NTLM hash Scenario: Then, use mimikatz to inject another user’s NTLM hash into the secret storage: Steal another user’s session Scenario: Then, with the use of mimikatz: privilege::debugsekurlsa::tickets /export This exports available tickets into the working directory (suffix .kirbi). Then, choose one file/ticket from the correct user and service. For…