ELI5: What is Pass-the-Hash?

Instead of figuring out your password, the attacker steals the scrambled version and uses it directly to log in. It’s like using a mold of a key instead of the actual key — it still opens the door.

Definition

Pass-the-hash is an attack technique that exploits Windows NTLM authentication by using a captured password hash directly for authentication—without needing to crack it to obtain the plaintext password. Since NTLM authentication uses the hash itself as proof of knowledge, an attacker with access to a hash (e.g., extracted from LSASS memory) can authenticate to other systems using that hash.

Key Details

  • Exploits NTLM authentication: The hash IS the credential in NTLM—knowing the hash is equivalent to knowing the password for authentication purposes.
  • Hashes are extracted from: LSASS process memory (using Mimikatz), SAM database, NTDS.dit (Active Directory database).
  • Enables lateral movement without cracking: attacker uses the hash to authenticate to other systems the account has access to.
  • Mitigation: Credential Guard (Windows 10/Server 2016+)—uses virtualization-based security to protect LSASS; Kerberos authentication (doesn’t use NTLM hashes); local admin account restrictions.
  • Pass-the-ticket: The Kerberos equivalent—uses stolen Kerberos tickets instead of NTLM hashes.

Connections