Network vs Interactive Logons
Network vs Interactive Logons
Interactive Logon (2): Initial Logon
mimikatz # privilege::debug
mimikatz # sekurlsa::logonpasswords
Interactive Logon (2) via runas and Local Account

Interactive Logon (2) via runas and Domain Account

New Credentials (9) via runas with /netonly


Network Logon (3) with Local Account
Network Logon (3) with Domain Account
Network Interactive Logon (10) with Domain Account



PsExec From An Elevated Prompt

PsExec + Alternate Credentials



Observations
References
PreviousDumping Domain Controller Hashes via wmic and Vssadmin Shadow CopyNextReading DPAPI Encrypted Secrets with Mimikatz and C++
Last updated