This whitepaper discusses Pass The Hash attacks as well as the tooling needed to perform the attacks.
You can download it from the following link: https://packetstormsecurity.com/files/download/162483/PassTheHash.pdf
Source: https://packetstormsecurity.com/files/162483/Pass-The-Hash-Lateral-Movement.html

