FBI Support Cyber Law Knowledge Base

  • Home
  • Knowledge Base
    • Articles
  • FAQ
  • Blog
  • Contact
  • Disclaimer

    Knowledge Base

    Find answers and help fast

    How Do Pass-the-Hash and Pass-the-Ticket Attacks Compromise Network Authentication?

    In modern enterprise networks—especially those built on Windows Active Directory (AD)—authentication plays a crucial role in verifying user identities and controlling access to sensitive resources. While robust authentication protocols such as NTLM and Kerberos are designed to secure this process, attackers have discovered ways to exploit inherent weaknesses in these protocols without needing to crack passwords outright. Two such advanced techniques are Pass-the-Hash (PtH) and Pass-the-Ticket (PtT) attacks.

    Both techniques enable lateral movement and privilege escalation across networks by reusing legitimate authentication artifacts, allowing adversaries to impersonate users (including administrators) and access protected systems. This essay delves deeply into the mechanisms behind PtH and PtT attacks, how they exploit network authentication models, their real-world impact, and mitigation strategies—with a concrete example to illustrate their consequences.


    Table of Contents

    Toggle
    • 1. Understanding the Network Authentication Landscape
      • 1.1 NTLM (NT LAN Manager)
      • 1.2 Kerberos
    • 2. What is a Pass-the-Hash (PtH) Attack?
      • 2.1. Definition
      • 2.2. How It Works
      • 2.3. Why It’s Effective
    • 3. What is a Pass-the-Ticket (PtT) Attack?
      • 3.1. Definition
      • 3.2. How It Works
      • 3.3. Advanced Variants
    • 4. Comparing Pass-the-Hash and Pass-the-Ticket
    • 5. Real-World Example: The NotPetya Cyberattack (2017)
      • Background
      • How PtH and PtT Were Used
      • Lessons from NotPetya
    • 6. Impact of PtH and PtT on Organizations
      • 6.1. Lateral Movement and Privilege Escalation
      • 6.2. Bypassing MFA and Authentication Policies
      • 6.3. Persistence
      • 6.4. Difficulty in Detection
    • 7. Mitigation and Defense Strategies
      • 7.1. Credential Hygiene
      • 7.2. Harden Authentication Protocols
      • 7.3. Enable LSASS Protection
      • 7.4. Deploy Multi-Factor Authentication (MFA)
      • 7.5. Least Privilege and Admin Tiering
      • 7.6. Monitor and Detect
      • 7.7. Rotate and Secure KRBTGT
    • 8. Conclusion

    1. Understanding the Network Authentication Landscape

    Before diving into PtH and PtT attacks, it’s important to understand how authentication typically works in a Windows domain environment.

    1.1 NTLM (NT LAN Manager)

    NTLM is an older Microsoft authentication protocol that uses challenge-response mechanisms and hash-based credentials for authentication. Despite being largely replaced by Kerberos, NTLM is still supported for backward compatibility.

    • Authentication involves sending an NTLM hash (a cryptographic representation of the password) to the server.

    • The hash can be used repeatedly without requiring the actual plaintext password.

    1.2 Kerberos

    Kerberos is the default authentication protocol in Active Directory environments.

    • Users authenticate once to a Key Distribution Center (KDC) and receive a Ticket Granting Ticket (TGT).

    • The TGT is then used to obtain Service Tickets (TGS) for accessing network resources.

    These tickets are cached on the user’s system and are valid for a specific time window.


    2. What is a Pass-the-Hash (PtH) Attack?

    2.1. Definition

    Pass-the-Hash is a technique where an attacker captures the NTLM hash of a user’s password and reuses it to authenticate to other systems without needing the plaintext password.

    It leverages the fact that many systems treat the hash itself as sufficient proof of identity.

    2.2. How It Works

    1. Obtain the Hash:

      • The attacker gains local administrative access to a Windows machine (e.g., via phishing, exploit, or malware).

      • They dump password hashes from the memory or SAM (Security Accounts Manager) using tools like Mimikatz, LSASS dump, or Windows Credential Editor.

    2. Use the Hash:

      • The attacker injects the stolen hash into their session.

      • They then use tools like PsExec, WMIC, or Remote Desktop to access another machine on the network that trusts the user represented by the hash.

    3. Lateral Movement:

      • Once access is gained, the attacker repeats the process, moving laterally and harvesting more credentials until domain admin access is achieved.

    2.3. Why It’s Effective

    • NTLM allows authentication via hashes.

    • Many organizations do not disable NTLM due to legacy dependencies.

    • Hashes remain valid until a password is changed.

    • No need to decrypt or crack the password.


    3. What is a Pass-the-Ticket (PtT) Attack?

    3.1. Definition

    Pass-the-Ticket involves stealing Kerberos tickets from a user’s session and reusing them to access resources within the domain—again, without needing the user’s password.

    3.2. How It Works

    1. Obtain the Tickets:

      • The attacker compromises a system and extracts the TGT and TGS Kerberos tickets from memory.

      • Tools like Mimikatz or Rubeus can dump these tickets from the LSASS (Local Security Authority Subsystem Service) process.

    2. Inject the Tickets:

      • The attacker uses ticket-injection tools to load the stolen ticket into their session.

      • The operating system then treats the attacker as the authenticated user.

    3. Access Services:

      • With valid tickets, the attacker can access any service that the original user could (e.g., file shares, email, databases, domain controllers).

    3.3. Advanced Variants

    • Golden Ticket Attack:

      • The attacker forges a TGT using the KRBTGT account hash (which signs all tickets in a domain).

      • Gives the attacker domain-wide persistent access.

    • Silver Ticket Attack:

      • The attacker forges a TGS for a specific service without needing a TGT.

      • Requires the service account’s hash only.


    4. Comparing Pass-the-Hash and Pass-the-Ticket

    Feature Pass-the-Hash (PtH) Pass-the-Ticket (PtT)
    Protocol Targeted NTLM Kerberos
    Artifact Used NTLM Hash Kerberos Tickets (TGT/TGS)
    Requires Admin Privileges Yes (to access hashes from LSASS/SAM) Yes (to extract tickets from memory)
    Tools Commonly Used Mimikatz, WCE, Hashcat, Impacket Mimikatz, Rubeus, Kekeo
    Can Forge Credentials? No Yes (Golden/Silver tickets)
    Ideal in Legacy Environments Yes Yes, but also common in modern environments

    5. Real-World Example: The NotPetya Cyberattack (2017)

    Background

    The NotPetya malware, which initially posed as ransomware, was in fact a destructive cyber weapon targeting Ukrainian infrastructure and spreading globally. It used advanced credential theft and lateral movement techniques including PtH and PtT.

    How PtH and PtT Were Used

    1. Initial Infection:

      • NotPetya was delivered through a compromised Ukrainian tax software called MeDoc.

      • Once inside a network, the malware executed LSASS dumps to extract credentials and NTLM hashes.

    2. Lateral Movement:

      • Used PsExec and WMIC with extracted hashes (PtH) to move laterally across systems.

      • Harvested Kerberos tickets from memory and reused them (PtT) to access additional network resources.

    3. Privilege Escalation and Spread:

      • Combined PtH and PtT with EternalBlue (SMBv1 exploit) and Mimikatz to spread rapidly.

      • Crippled multinational corporations (e.g., Maersk, FedEx, Merck) causing billions in damages.

    Lessons from NotPetya

    • Valid credentials and authentication tokens can be weaponized.

    • Lateral movement is swift once domain trust is abused.

    • Relying on passwords or single-sign-on (SSO) without behavioral analysis is a critical vulnerability.


    6. Impact of PtH and PtT on Organizations

    6.1. Lateral Movement and Privilege Escalation

    • Attackers can leapfrog across the network using stolen credentials.

    • Leads to full domain compromise if a domain admin is impersonated.

    6.2. Bypassing MFA and Authentication Policies

    • MFA typically protects login attempts, not token usage.

    • Once a hash or ticket is stolen, MFA is circumvented.

    6.3. Persistence

    • Golden tickets can remain valid for 10 years if not detected.

    • Attackers can establish backdoors or create new domain accounts.

    6.4. Difficulty in Detection

    • Activity often appears legitimate because the attacker uses valid credentials.

    • SIEMs must detect anomalous behavior rather than failed login attempts.


    7. Mitigation and Defense Strategies

    7.1. Credential Hygiene

    • Enforce strong password policies.

    • Regularly rotate passwords—especially for service accounts.

    • Avoid password reuse across systems.

    7.2. Harden Authentication Protocols

    • Disable NTLM where possible; enforce Kerberos-only authentication.

    • Implement Extended Protection for Authentication (EPA).

    7.3. Enable LSASS Protection

    • Use Credential Guard (Windows 10+) to isolate secrets.

    • Set RunAsPPL to run LSASS in protected process mode.

    7.4. Deploy Multi-Factor Authentication (MFA)

    • While not foolproof, it raises the barrier for initial compromise.

    • Combine with context-aware authentication (device, IP, geolocation).

    7.5. Least Privilege and Admin Tiering

    • Segment admin accounts by role (e.g., workstation vs. domain admin).

    • Use Just-In-Time (JIT) and Just-Enough-Access (JEA) principles.

    7.6. Monitor and Detect

    • Use tools like Sysmon, ELK, Sentinel, or Splunk for telemetry.

    • Monitor for suspicious logins, token reuse, or ticket anomalies.

    7.7. Rotate and Secure KRBTGT

    • Reset the KRBTGT account password at least twice when compromised.

    • Secure domain controllers and restrict physical/logical access.


    8. Conclusion

    Pass-the-Hash and Pass-the-Ticket attacks are sophisticated techniques that exploit the trust-based nature of authentication in Windows networks. By reusing valid credentials—whether in hash or ticket form—attackers can bypass traditional security measures, impersonate users, and traverse the network undetected.

    These attacks underscore a key principle in cybersecurity: Authentication artifacts are just as sensitive as passwords. If they can be stolen, they can be misused.

    The modern defense against these threats is not just better passwords or more firewalls, but rather a layered security posture involving credential protection, behavioral analytics, privileged access management, and vigilant monitoring. As attackers continue to evolve, so too must our defenses, rooted in the understanding that trust, once broken, becomes the ultimate vulnerability.

    Last Updated: 4 months ago

    By Shubhleen Kaur

    Tags: Credential Theft & Account Takeover, Cyber Attacks & Threats

    Shubhleen Kaur

    Posts

    Categories

    • Advance fee scams
    • Advanced Data Protection Techniques
    • Advanced Persistent Threats (APTs)
    • Advanced Security Techniques & Methodologies
    • AI Ethics & Cybersecurity
    • AI-Driven Cybersecurity Issues
    • AI's Impact on Data & Identity
    • Application & Software Security Tools
    • Avoiding Online Scams & Fraud
    • Bad check scams
    • Blog
    • Children's Online Safety
    • Cloud & SaaS Attacks
    • Cloud & SaaS Security Concerns
    • Cloud & Virtualization Security Tools
    • Consumer Privacy & Rights
    • Consumer Protection & Digital Rights
    • Core Data Protection Fundamentals
    • Core Defensive Tools & Platforms
    • Core Device Security Fundamentals
    • Corporate Liability & Accountability
    • Credential Theft & Account Takeover
    • Critical Information Infrastructure (CII) Protection
    • Critical Infrastructure & OT Security
    • Cyber Attacks & Threats
    • Cyber Hygiene & Best Practices for Individuals
    • Cyber Insurance & Legal Nuances
    • Cyber Insurance & Risk Management
    • Cyber Jurisdiction & Conflicts of Law
    • Cyber Law in Canada
    • Cyber Law in USA
    • Cyber Resilience & Business Continuity Tools
    • Cyber Security
    • Cyber-Physical System Attacks
    • Cybercrime & Law Enforcement
    • Cybercrime & Law Enforcement Updates
    • Cybersecurity Awareness Campaigns & Best Practices
    • Cybersecurity Education & Awareness Gaps
    • Cybersecurity for Users
    • Cybersecurity in Specific Sectors
    • Cybersecurity Professional Ethics
    • Cybersecurity Tools & Techniques
    • Cybersecurity Workforce & Talent Gap
    • Data & Database Security Tools
    • Data & Identity Protection
    • Data Breaches & Privacy
    • Data Exfiltration & Leakage
    • Data Manipulation & Integrity Attacks
    • Data Privacy & Protection Laws
    • Data Privacy for Individuals (DPDPA 2023/2025 India)
    • Data Privacy Regulations & Compliance (Global & India Focus)
    • Data Protection in Cloud & Hybrid Environments
    • Data Retention & Deletion Laws
    • Database & Big Data Security Tools
    • Denial of Service (DoS/DDoS) Attacks
    • Device & Application Security
    • DevSecOps & Security Automation in SDLC
    • Digital Identity & Authentication Laws
    • Emerging & Future Technologies in Cybersecurity
    • Emerging Attack Vectors & Techniques
    • Emerging Technologies & Future Threats
    • Emerging Threat Mitigation Techniques
    • Emerging Threats & Attack Vectors
    • Empowerment and Resources
    • Endpoint Management & Security
    • Ethical Considerations in Cyber Warfare & National Security
    • Ethical Considerations in Cybersecurity Careers
    • Ethical Hacking & Penetration Testing
    • Ethics of Cyber Surveillance & Monitoring
    • Financial Cybercrime
    • Future Legal & Ethical Landscape
    • Future Skill Predictions
    • Gaming Security
    • General Cyber Hygiene & Behavior
    • Geopolitical Cyber Attacks & Espionage
    • Geopolitical Cyber Warfare & Espionage
    • Governance
    • Home Network Security
    • Identity & Access Management (IAM) Essentials
    • Identity & Access Management (IAM) Tools
    • Identity Theft & Fraud Prevention
    • Identity Theft Prevention
    • Incident Response & Recovery
    • Insider Threats
    • Internet Fraud
    • IoT & Edge Computing Data Protection
    • IoT & Operational Technology (OT) Attacks
    • IoT Device Security for Home Users
    • Legal & Ethical Aspects
    • Legal Aspects of Incident Response
    • Managing Privileged Identities
    • Mobile & IoT Security Risks
    • Mobile & Wireless Threats
    • Mobile Device Security
    • Mobile Device Security for Enterprises
    • Multi-Factor Authentication (MFA)
    • Network & Infrastructure Security Tools
    • Online Banking & Shopping Security
    • Open-Source Cybersecurity Tools & Frameworks
    • Pagejacking
    • Phishing
    • Phishing & Social Engineering
    • Physical & Operational Security Tools
    • Privacy Settings Management
    • Privacy-Enhancing Technologies (PETs) & Legal Implications
    • Professional Development & Ecosystem Tools
    • Protecting Your Digital Footprint
    • Ransomware & Extortion
    • Recent Issues & Awareness
    • Regulatory Landscape & Compliance
    • Regulatory Sandboxes & Innovation
    • Risk & Compliance (GRC) Tools
    • Safe Browse & Email Habits
    • Safe Online Communication
    • Secure Cloud Storage & Backup
    • Security Operations & Automation
    • Social Engineering & Human Factor
    • Software & Hardware Vulnerabilities
    • Software Updates & Antivirus
    • Spam and Identity Theft
    • Specialized Analysis & Testing Tools
    • Strong Password Practices
    • Supply Chain Attacks
    • Supply Chain Vulnerabilities & Exploits
    • Threat Intelligence & Incident Response Tools
    • Top Cyber Threat Trends
    • Uncategorized
    • Understanding Common Cyber Threats
    • Web Application & API Attacks
    • Wire transfer fraud
    • Work-Life Balance & Wellness
    • Zero-Day Exploits & Advanced Exploitation

    Recent Posts

    • How Can Organizations Utilize Security Ratings Services to Assess Their Cybersecurity Posture Externally?
    • What are the tools for automating security policy creation and enforcement?
    • Understanding the Importance of a Cybersecurity Talent Management System for Workforce Development
    • How do cybersecurity simulation tools prepare teams for real-world cyber attack scenarios?
    • Exploring the Use of Security Frameworks (NIST, ISO 27001) for Structured Security Programs

    Copyright 2018. Powered by FBI Support