Adversaries may use alternate authentication material, such as password hashes, Kerberos tickets, and application access tokens, in order to move laterally within an environment and bypass normal system access controls.
Sub-techniques
T1550.001 T1550.002 T1550.003 T1550.004
See: MITRE ATT&CK