passthehash
Pass-the-hash is a post-exploitation technique used in computer security. It allows an attacker who has already gained some level of administrative access to a network to authenticate to other systems without needing to know the plaintext passwords. Instead, the attacker captures and reuses the authentication tokens, specifically the NTLM hashes, of legitimate users.
This technique typically involves obtaining password hashes from memory, a SAM file, or via other means after
The effectiveness of pass-the-hash relies on the fact that many Windows systems are configured to allow authentication