Pass the Hash (NTLM)
Limitations
UAC limits the local users ability
If the registry key HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\LocalAccountTokenFilterPolicy is set to 0
only the built-in admin can perform remote administration tasks
setting it to 1 will allow other local admins
If FilterAdministratorToken (disabled by default) is enabled, the RID 500 (even if renamed) is enrolled in UAC, which means PTH will fail when using the account
Bypassing UAC
tried when error in sekurlsa::logonpasswords
https://raw.githubusercontent.com/FuzzySecurity/PowerShell-Suite/master/Bypass-UAC/Bypass-UAC.ps1
Last updated