Open Cyb3rWard0g opened 4 years ago
Through this connection, the attacker copies the Mimikatz binary used in Step 14 to the domain controller (T1105) then dumps the hash of the KRBTGT account (T1103).
Description
Through this connection, the attacker copies the Mimikatz binary used in Step 14 to the domain controller (T1105) then dumps the hash of the KRBTGT account (T1103).