Trending Tutorials

Passing the Hash: How to hack Windows Server 2012 – Privilege Escalation to Domain Admin



This is an instructional video tutorial on steps to take to obtain and to pass an NTML hash to promote a limit user to domain admin. This would provide your user with access to all domain systems on the network.

Also, I am not responsible to you get in trouble for doing this. Only test this on your network or if you have permission to perform this on another network.

13 Comments on Passing the Hash: How to hack Windows Server 2012 – Privilege Escalation to Domain Admin

  1. But one thing how did you make restriction that only domain admins are allowed to access?

  2. Wow! Excellent explaining.

  3. I have a question. Can you also PROCEED these hacks as a regular workstation in domain? thanks

  4. Very well taught. good task

  5. Can you demonstrate this using Pivoting <3

  6. I can't get invoke-mimikatz.ps1 online, I mean i cant download it

  7. After remotely connecting to local administrator, I can only see NTLM hashes for the local administrators by using mimitatz
    Please Help!

  8. thank you for explaining mimikatz, I have one question: how mimikatz retrieved the NTML hashes for "192.168.159" since it will read the NTML hashes from the memory,you need to have an active session (RDP) opened from 192.168.159 to 192.168.1.161, is that correct ?

  9. Anyone who need windows server 2012 serial key can visit http://mskeystore.blogspot.com/, or https://www.facebook.com/mskeystorewin7/, it will update free activation keys of windows products everyday.

Leave a comment

Your email address will not be published.


*