Pass the Hash (PtH) Attacks
π― Overview
π§ Windows NTLM Authentication Protocol
NTLM Overview
NTLM Vulnerabilities
# Key weaknesses exploited in PtH attacks:
1. Passwords stored without salt on servers/domain controllers
2. Password hashes remain static between password changes
3. Hash can be used directly for authentication
4. Legacy compatibility requirements keep NTLM active
5. Challenge-response doesn't validate hash freshnessHash Acquisition Methods
πͺ Windows-Based Pass the Hash Attacks
1. Mimikatz - sekurlsa::pth Module
Basic Mimikatz PtH Syntax
Mimikatz PtH Execution
Post-Exploitation with Mimikatz
2. Invoke-TheHash - PowerShell PtH Framework
Invoke-TheHash Overview
Required Parameters
SMB Method with Invoke-TheHash
WMI Method with Reverse Shell
π§ Linux-Based Pass the Hash Attacks
1. Impacket PtH Tools
impacket-psexec
Other Impacket PtH Tools
Advanced PtH + VSS Extraction
2. NetExec (CrackMapExec) PtH Attacks
Basic NetExec PtH
NetExec Command Execution
3. Evil-WinRM PtH
Basic Evil-WinRM Usage
Evil-WinRM Post-Exploitation
π₯οΈ RDP Pass the Hash Attacks
Prerequisites for RDP PtH
Enable Restricted Admin Mode
RDP PtH with xfreerdp
π‘οΈ UAC and PtH Limitations
Local Account Token Filter Policy
Domain vs Local Account Differences
π― HTB Academy Lab Exercises
Lab Environment
Exercise 1: Basic PtH Access
Exercise 2: RDP Registry Configuration
Exercise 3: Hash Extraction with Mimikatz
Exercise 4: Share Access with David's Hash
Exercise 5: Julio Share Access
Exercise 6: Reverse Shell with Invoke-TheHash
Optional Exercise: Remote Management Users
π Pass the Hash Methodology
Pre-Attack Requirements
Attack Decision Matrix
Execution Method Selection
π‘οΈ Detection and Defense
Detection Indicators
Defense Recommendations
π‘ Key Takeaways
Last updated