pass-the-hash

vinpearlnetworking, OSCP pass-the-hash
0 Comments

How It Works (Step-by-Step)

  1. Initial Compromise
    • Attacker gains access to a Windows machine (via phishing, exploit, or misconfig).
    • They escalate privileges to access LSASS memory.
  2. Hash Extraction
    • Tools like Mimikatz, ProcDump, or Pypykatz are used to dump LSASS.
    • Extracted NTLM hashes include those of local admins or domain users.
  3. Authentication Replay
    • Using tools like pth-winexe, Impacket, or Cobalt Strike, the attacker authenticates to another system by passing the hash.
    • No password cracking required—just hash injection.
  4. Lateral Movement
    • Attacker pivots across systems using the same hash.
    • If local admin passwords are reused across machines, one hash unlocks many endpoints.
  5. Privilege Escalation & Persistence
    • Attacker may target DCs, dump more hashes, create backdoors, or exfiltrate data.

🛡️ Why It’s Dangerous

  • Bypasses password complexity: Doesn’t matter how strong the password is.
  • Evades detection: Appears as legitimate user activity.
  • Enables rapid lateral movement: Especially in flat networks or with reused credentials.

🔐 Mitigation Strategies

Defense LayerAction
Credential HygieneUse unique local admin passwords (LAPS), enforce password rotation
Memory ProtectionEnable Credential Guard, isolate LSASS
Logging & DetectionMonitor for LSASS access, unusual SMB/RDP logins
Network SegmentationLimit lateral movement paths, restrict admin access
MFA & PAMUse multi-factor authentication and privileged access management


Leave a Reply

Your email address will not be published. Required fields are marked *