What do Pen Testers generally do after dumping hashes (or creds)? I asked this question during my workshop at BlackHat Europe. The answer was use of tools like psexec (independent or msf) to replay or pass the hashes to get access to more machines. This could be more fun and useful with a combination of Windows Credential Editor (thanks Hernan!) and Powershell.
I call this Poshing the Hashes.
read more...........http://labofapenetrationtester.blogspot.in/2013/04/poshing-the-hashes.html