Adversaries may “pass the hash” using stolen password hashes to move laterally within an environment, bypassing normal system access controls.

Tactics
TA0005 TA0008

Sub-technique of
T1550


See: MITRE ATT&CK