Read the original article: Pass the Way to DA
Pass the X attacks originate from having a piece of information, in these examples this will be a hash, a set of credentials or a Kerberos ticket and then leveraging them for lateral movement throughout a network.
Read the original article: Pass the Way to DA