Limited Time Offer!
For Less Than the Cost of a Starbucks Coffee, Access All DevOpsSchool Videos on YouTube Unlimitedly.
Master DevOps, SRE, DevSecOps Skills!
Quick Definition (30โ60 words)
Pass the hash is a credential-theft technique where an attacker uses a hashed password directly to authenticate without knowing the plaintext. Analogy: handing someone a stamped ticket instead of the original receipt. Formal: reusing NTLM or equivalent credential hashes to impersonate a user for authentication to network resources.
What is pass the hash?
Pass the hash (PtH) is an authentication abuse where a hashed credential is replayed to authenticate as the account owner without cracking the password. It is an attack technique, not an authentication feature. It is NOT the same as stealing plaintext credentials or typical password spraying.
Key properties and constraints:
- Targets systems that accept hash-based authentication like NTLM or some challenge-response flows.
- Requires local access to a machine or interception of authentication material.
- Often combined with lateral movement, privilege escalation, and persistence.
- Works best in environments with reused credentials, long-lived sessions, or where hashes are cached.
- Less effective where modern protocols enforce mutual authentication or use ephemeral tokens.
Where it fits in modern cloud/SRE workflows:
- Relevant for hybrid environments bridging on-prem identity and cloud identity providers.
- Important for SREs running Windows workloads, AD domain controllers, legacy services, or lift-and-shift apps.
- Impacts CI/CD pipelines that use long-lived service accounts and stored hashes.
- Must be considered when designing least-privilege, secret management, and ephemeral credentials in cloud-native patterns.
Text-only diagram description readers can visualize:
- Attacker obtains local admin on Host A.
- Attacker extracts cached hashes for user X from Host A.
- Using the hash, attacker authenticates to Service B as user X without password.
- Attacker moves laterally to Domain Controller or critical resource.
pass the hash in one sentence
Using an authentication hash as a reusable credential to impersonate an account without needing the plaintext password.
pass the hash vs related terms (TABLE REQUIRED)
| ID | Term | How it differs from pass the hash | Common confusion |
|---|---|---|---|
| T1 | Credential dumping | Credential dumping is the extraction step; pass the hash is the replay step | Often used interchangeably with pass the hash |
| T2 | Pass the ticket | Uses Kerberos tickets, not NTLM hashes | Both enable lateral movement but use different artifacts |
| T3 | Password spraying | Tests many passwords across accounts; not hash reuse | Mistaken for hash-based replay attacks |
| T4 | Brute force | Cracks passwords via trial; pass the hash reuses existing hash | Brute force tries plaintext guesses |
| T5 | Golden ticket | Forged Kerberos TGTs; more powerful than simple hash replay | Both enable persistence but are distinct |
| T6 | Hash cracking | Derives plaintext from a hash; pass the hash avoids cracking | People assume cracking is required |
| T7 | NTLM relay | Relays NTLM authentication to another endpoint; different technique | Often conflated with pass the hash |
Row Details (only if any cell says โSee details belowโ)
- None.
Why does pass the hash matter?
Business impact:
- Revenue: Successful lateral movement to payment systems or customer databases can disrupt revenue streams via data exfiltration or fraud.
- Trust: Breaches driven by PtH can damage customer trust and regulatory standing.
- Risk: Long-lived hashes and poorly segmented networks increase breach blast radius.
Engineering impact:
- Incident reduction: Eliminating long-lived credentials and enforcing ephemeral tokens reduces PtH risk and incidents.
- Velocity: Secure automation like ephemeral secrets can maintain velocity while reducing credential exposure. Conversely, legacy static service accounts slow safe deployments.
SRE framing:
- SLIs/SLOs: Authentication success rates, privilege escalation incidents, and mean time to detect credential misuse can be SLIs.
- Toil: Manual credential rotation is high toil; automation reduces risk.
- On-call: Incident patterns include widespread account impersonation requiring coordinated response.
3โ5 realistic โwhat breaks in productionโ examples:
- Attack moves from dev workstation to CI server using cached admin hash and alters pipelines.
- Lateral movement to domain controller using stolen service account hash, leading to kerberoasting or broader compromise.
- Exfiltration from storage containing customer data after authenticating via hash replay to file servers.
- Unauthorized infrastructure modifications in cloud consoles where hybrid identity links accept NTLM or legacy auth.
- Disruption in multi-tenant SaaS where a compromised operator account uses stored hashes to access tenant data.
Where is pass the hash used? (TABLE REQUIRED)
| ID | Layer/Area | How pass the hash appears | Typical telemetry | Common tools |
|---|---|---|---|---|
| L1 | Edge network | Authentication to legacy SMB or RPC services | Failed and successful NTLM auth logs | Logon auditing tools |
| L2 | Host OS | Local cached hashes or credentials | Local security events and memory traces | Credential dumper utilities |
| L3 | Service layer | Service accounts using NTLM or reused secrets | Service auth logs and connection traces | Service account management |
| L4 | Application | Apps using integrated Windows auth | App auth failures and session anomalies | App logs |
| L5 | Data layer | File share access via NTLM | File server access logs | File monitoring tools |
| L6 | IaaS | Hybrid VMs using domain creds | Cloud audit logs and VM console logs | Cloud IAM and audit |
| L7 | PaaS | Legacy connectors using stored hashes | Connector error and access logs | Managed identity tools |
| L8 | SaaS | On-prem sync agents with cached creds | Sync logs and MFA bypass indicators | SaaS admin logs |
| L9 | Kubernetes | Windows nodes or hybrid nodes with AD joins | Kube logs and node auth traces | K8s logging agents |
| L10 | Serverless | Connectors using long-lived service account hashes | Invocation and auth failure logs | Secrets managers |
| L11 | CI/CD | Build agents with cached credentials | Pipeline logs and auth telemetry | Secrets store integrations |
| L12 | Incident response | Post-compromise lateral movement traces | Correlated auth and process telemetry | EDR and SIEM |
Row Details (only if needed)
- None.
When should you use pass the hash?
This section addresses when pass the hash is relevant from a defensive or investigative perspective rather than when to “use” it offensively.
When itโs necessary (defensive/investigative):
- During post-compromise investigations to validate lateral movement patterns.
- When auditing legacy environments that must continue to support NTLM for compatibility.
- In red-team exercises to test detection and response against realistic attack techniques.
When itโs optional:
- In environments fully migrated to modern identity (OAuth2, Kerberos with strong defenses, FIDO2) โ optional only for legacy verification.
- For CI/CD verification if ephemeral credentials exist; only needed for legacy service account audits.
When NOT to use / overuse it:
- Never use stored long-lived hashes in production automation.
- Avoid relying on NTLM or hash-based auth in cloud-native services.
- Do not treat PtH testing as the only security check โ focus on holistic identity hygiene.
Decision checklist:
- If environment uses legacy Windows auth AND you have sysadmin privileges -> prioritize detection and hardening.
- If all services use ephemeral cloud identities and MFA -> deprioritize PtH specific mitigations.
- If CI/CD pipelines use shared service accounts -> rotate secrets and adopt ephemeral tokens.
Maturity ladder:
- Beginner: Inventory where NTLM/hash auth is required and enable logging.
- Intermediate: Implement least privilege, LAPS, and centralized credential storage with rotation.
- Advanced: Eliminate NTLM, adopt short-lived certificates/tokens, enable continuous verification and anomaly detection.
How does pass the hash work?
Step-by-step overview:
- Initial access: Attacker gains local elevated access or user-level access on a host.
- Credential collection: Attacker extracts hashed credentials from memory, SAM, LSA, or cached credentials.
- Authentication replay: Using tools or system APIs, the attacker presents the hash to a target service that accepts hashed auth (e.g., NTLM).
- Lateral movement: Authenticated access is used to move to new machines, escalate privileges, or access sensitive data.
- Persistence and cleanup: Attacker may create backdoors or deploy long-term artifacts and attempt to cover tracks.
Components and workflow:
- Source host where hashes are collected.
- Tools used for extraction and replay.
- Target services accepting hash-based auth (SMB, RPC, some web integrations).
- Network and domain controllers for elevated actions.
Data flow and lifecycle:
- Hash extracted -> stored in attacker memory -> used by replay tool to authenticate to target -> success logs appear on target -> attacker uses access.
Edge cases and failure modes:
- Modern Kerberos-only environments block NTLM, reducing PtH utility.
- Local machine protections (LSA protection, Credential Guard) can prevent extraction.
- Network segmentation and MFA on critical resources can mitigate replay.
Typical architecture patterns for pass the hash
-
Pattern: Legacy Windows estate with domain-joined hosts. When to use: Historic environments pending migration.
-
Pattern: Hybrid cloud with AD Connect syncing on-prem and cloud identities. When to use: Organizations bridging cloud and on-prem.
-
Pattern: CI/CD environment with Windows build agents using shared service accounts. When to use: Pipelines that have not migrated to ephemeral tokens.
-
Pattern: Managed file servers accepting NTLM and SMB from many hosts. When to use: File services that require legacy clients.
-
Pattern: Red-team engagement using PtH to simulate advanced adversary lateral movement. When to use: Purple team exercises and detection tuning.
Failure modes & mitigation (TABLE REQUIRED)
| ID | Failure mode | Symptom | Likely cause | Mitigation | Observability signal |
|---|---|---|---|---|---|
| F1 | Hash extraction blocked | Tools fail to read LSA | Credential Guard or LSA protections | Enable Windows protections and patch | Absent local extraction logs |
| F2 | NTLM disabled | Replay attempts fail | Policy enforcing Kerberos only | Enforce Kerberos and remove NTLM | NTLM auth failures in logs |
| F3 | Network segmentation stops lateral move | Access denied across network | Firewall or segmentation | Apply strict segmentation and egress rules | Connection denied events |
| F4 | MFA enforced on target | Auth requires additional factor | MFA required on account | Enforce MFA for interactive and service access | MFA challenge logs |
| F5 | Stale credentials | Replay authenticates but fails for access | Account disabled or rotated | Implement automatic rotation and auditing | Account change events |
| F6 | Alerting triggers on unusual auth | SOC alerted and blocks action | Anomaly detection configured | Tune detections and automation playbooks | SIEM alerts and block events |
Row Details (only if needed)
- None.
Key Concepts, Keywords & Terminology for pass the hash
This glossary contains concise definitions and why each term matters. Each entry: Term โ definition โ why it matters โ common pitfall.
- Access token โ Proof of authentication used by OS to represent a user โ Central to impersonation and cadence of rights โ Assuming token theft equals hash theft.
- AD DS โ Active Directory Domain Services โ Core on-prem identity store for Windows environments โ Treating AD as infallible.
- Authentication hash โ A hashed representation of credentials used in some protocols โ Replay target in PtH attacks โ Assuming hashes cannot be reused.
- Authorization โ Permission checking after authentication โ Determines what an impersonated user can do โ Confusing auth with authz.
- Azure AD Connect โ Sync tool between on-prem AD and Azure AD โ Can expand blast radius if on-prem is compromised โ Overlooking connector security.
- Baseline hardening โ Minimum security configuration โ Reduces exposure to legacy attacks โ Neglecting inventories.
- Blended attack โ Multi-stage attack using several techniques โ PtH often part of blended campaigns โ Focusing only on one detection type.
- Brute force โ Repeated attempts to guess passwords โ Different from PtH which reuses hashes โ Confusing with PtH.
- Certificate-based auth โ Uses certificates instead of passwords โ Defends against PtH if deployed broadly โ Incomplete rollouts create gaps.
- Challenge-response โ Authentication using a server challenge and client response โ NTLM relies on this model โ Assuming it prevents replay.
- Cloud IAM โ Identity and access management in cloud โ Should replace long-lived on-prem hashes โ Misconfiguring cross-tenant trust.
- Credential dumping โ Extracting credential material from a host โ Precedes pass the hash usage โ Overlooking memory-only dumps.
- Credential Guard โ Windows feature isolating secrets in a secure enclave โ Prevents many PtH extraction techniques โ Not always enabled on servers.
- Data exfiltration โ Unauthorized removal of data โ PtH enables lateral access to data stores โ Incomplete DLP coverage.
- Domain controller โ AD server with authoritative credentials โ High-value PtH target โ Under-protection increases risk.
- EDR โ Endpoint detection and response โ Detects suspicious extraction and replay behavior โ Blind spots in noisy environments.
- Ephemeral credentials โ Short-lived tokens for auth โ Reduce lifetime of usable artifacts โ Mismanaged token rotation can break automation.
- Event logs โ OS and application logs of activities โ Primary telemetry for detecting PtH โ Logs may be disabled/forwarding gaps.
- Forward secrecy โ Crypto property preventing reuse of keys โ Not applicable to NTLM hashes โ Misapplied expectations.
- Golden ticket โ Forged Kerberos TGT granting wide access โ More powerful than PtH โ Confusion about differences.
- Hash replay โ Reusing a hash to authenticate โ The core of PtH โ Thinking that hashing equals secure storage.
- Hash type โ The algorithm used to derive the hash โ NTLM v1 vs v2 differences โ Ignoring protocol variants.
- Identity federation โ Linking identities across systems โ Can propagate compromise if not validated โ Inadequate token validation.
- Intrusion kill chain โ Stages of an intrusion from recon to exfiltration โ PtH fits in lateral movement stage โ Neglecting earlier detection.
- Kerberos โ Ticket-based authentication protocol โ Alternative to NTLM with stronger protections โ Misconfiguration weakens it.
- Least privilege โ Grant minimal access needed โ Limits damage of PtH โ Misapplied when service complexity demands broader rights.
- Lateral movement โ Attacker movement across network โ PtH enables this in Windows estates โ Underestimating non-Windows paths.
- LAPS โ Local Administrator Password Solution that rotates local admin passwords โ Reduces reuse and PtH viability โ Not always deployed.
- Log aggregation โ Centralizing logs for detection โ Essential for tracking PtH activity โ Gaps cause missed detections.
- MFA โ Multi-factor authentication requiring more than password โ Blocks many PtH paths for interactive logins โ Not always enforced for services.
- Memory forensics โ Analyzing RAM to find secrets โ Useful for finding temporary artifacts โ Time-sensitive and resource-heavy.
- NTLM โ Older Microsoft authentication protocol using challenge-response hashes โ Primary protocol exploited by PtH โ Believing NTLM is safe by default.
- On-prem identity โ Local identity infrastructure โ Common PtH target โ Failing to isolate hybrid trust.
- Password hash โ Result of applying hashing algorithm to password โ Reused in PtH attacks โ Improper storage increases risk.
- Pass the ticket โ Kerberos ticket replay attack โ Similar goal to PtH but different artifact โ Confusing the two.
- Persistence โ Techniques to maintain foothold โ PtH can support persistence via account impersonation โ Focusing only on initial access.
- Principal of least privilege โ Redundant with least privilege; applies to identities โ Reduces attack impact โ Overly restrictive configs cause outages.
- Replay attack โ Reuse of captured authentication tokens โ General category including PtH โ Treating all replays the same.
- Segmentation โ Network separation to limit lateral movement โ Mitigates PtH spread โ Poorly implemented segmentation fails.
- Service account โ Account used by services rather than humans โ Common target for PtH if long-lived โ Using human-equivalent privileges is risky.
- SIEM โ Security Information and Event Management โ Central to detection of PtH patterns โ Overwhelm leads to missed alerts.
- SMB โ Server Message Block protocol often using NTLM โ Common vector for PtH lateral movement โ Assuming SMBv1 is rare.
- Token theft โ Stealing access tokens from memory โ Analogous to hash theft โ Underestimating ephemeral token security.
- Zero trust โ Security model assuming no implicit trust โ Resists PtH by continuous verification โ Partial adoption leaves gaps.
How to Measure pass the hash (Metrics, SLIs, SLOs) (TABLE REQUIRED)
| ID | Metric/SLI | What it tells you | How to measure | Starting target | Gotchas |
|---|---|---|---|---|---|
| M1 | NTLM auth rate | Volume of NTLM authentications | Count NTLM events per minute | Reduce 90% in 6 months | Legacy apps may need NTLM |
| M2 | Suspicious auth anomalies | Frequency of anomalous logins | Baseline and count deviations | Alert at 5x baseline | High false positives initially |
| M3 | Credential dump attempts | Attempts to access LSA or SAM | EDR detections and log events | Zero tolerated | Tool evasion possible |
| M4 | Lateral movement alerts | Cross-host auths by same principal | Correlate auth across hosts | Detect within 15 minutes | Requires centralized logs |
| M5 | Service account reuse | Count of services using same creds | Inventory of credential usage | Reduce reuse by 80% | Hidden use in scripts |
| M6 | Time to detect credential misuse | MTTR for credential compromise | Time from misuse to detection | < 15 minutes for critical | Depends on observability coverage |
| M7 | MFA coverage for privileged accounts | Percent of privileged accounts with MFA | Inventory vs MFA state | 100% for privileged | Some services not compatible |
| M8 | Credential rotation frequency | How often sensitive creds rotate | Track rotation events | Weekly to monthly per policy | Rotation breaks automation |
| M9 | Failed NTLM auths to critical servers | Failed attempts signaling replay | Count failed NTLM auth events | Alert on spikes | Attackers may avoid noisy patterns |
Row Details (only if needed)
- None.
Best tools to measure pass the hash
Tool โ EDR (Endpoint Detection and Response)
- What it measures for pass the hash: Process behaviors, memory access, LSA interaction, suspicious auths.
- Best-fit environment: Windows-heavy enterprise.
- Setup outline:
- Deploy agents across hosts.
- Configure detection rules for LSA/SAM access.
- Integrate with SIEM.
- Tune for false positives.
- Strengths:
- Deep endpoint visibility.
- Real-time mitigation on host.
- Limitations:
- Can be noisy and resource-intensive.
- Evasion possible by advanced tooling.
Tool โ SIEM
- What it measures for pass the hash: Correlated auth events, lateral movement patterns.
- Best-fit environment: Enterprise with centralized logging.
- Setup outline:
- Collect Windows event logs and network logs.
- Implement correlation rules for cross-host auths.
- Add alert workflows.
- Strengths:
- Correlation across sources.
- Long-term storage for forensics.
- Limitations:
- Requires tuning and maintenance.
- Data volume costs.
Tool โ Active Directory auditing tools
- What it measures for pass the hash: Domain authentication trends and anomalies.
- Best-fit environment: AD-managed environments.
- Setup outline:
- Enable detailed auditing.
- Monitor privileged account activities.
- Alert on unusual ticket or hash usage.
- Strengths:
- Direct domain visibility.
- Essential for AD incidents.
- Limitations:
- Verbose logs; needs aggregation.
- Not sufficient alone.
Tool โ Network traffic analysis
- What it measures for pass the hash: SMB/NTLM traffic patterns and relays.
- Best-fit environment: Environments with east-west visibility.
- Setup outline:
- Collect packet captures or NetFlow.
- Inspect for NTLM handshakes.
- Alert on suspicious relay patterns.
- Strengths:
- Detects on-wire misuse.
- Can find relays that endpoint visibility misses.
- Limitations:
- Encrypted traffic reduces visibility.
- High data processing needs.
Tool โ Secrets manager / Vault
- What it measures for pass the hash: Usage and rotation of stored credentials.
- Best-fit environment: CI/CD and cloud-native teams.
- Setup outline:
- Migrate service accounts into secrets manager.
- Enable rotation and short TTLs.
- Audit access logs.
- Strengths:
- Reduces long-lived credential exposure.
- Centralized control and audit.
- Limitations:
- Integration work required.
- Secrets manager compromise becomes a high-value target.
Recommended dashboards & alerts for pass the hash
Executive dashboard:
- Panel: NTLM usage trend โ Shows reduction over time.
- Panel: Privileged MFA coverage โ Percentage covered.
- Panel: Incidents related to credential misuse โ High-level counts and severity. Why: Shows leadership progress and residual risk.
On-call dashboard:
- Panel: Real-time suspicious auth anomalies โ Active alerts.
- Panel: Hosts with LSA access attempts โ Prioritized by risk.
- Panel: Lateral movement correlation map โ Shows likely next hops. Why: Immediate context for responders.
Debug dashboard:
- Panel: Recent NTLM handshake details โ timestamps and source/target.
- Panel: Process tree for suspected host โ Shows processes involved.
- Panel: File and registry changes near authentication events โ For forensics. Why: Deep dive for remediation and root cause.
Alerting guidance:
- Page vs ticket: Page on confirmed or high-confidence lateral movement or credential compromise impacting production; ticket for low-confidence anomalies.
- Burn-rate guidance: If incident rate exceeds normal by >3x in a short window, escalate to incident commander.
- Noise reduction tactics: Deduplicate similar alerts by host and time window; group by principal; suppress known maintenance windows.
Implementation Guide (Step-by-step)
1) Prerequisites – Inventory of legacy NTLM-enabled services and service accounts. – Centralized logging and EDR deployment. – Policy defining privileged accounts and rotation cadence.
2) Instrumentation plan – Enable Windows Authentication auditing at high fidelity. – Deploy EDR agents and forward logs to SIEM. – Instrument service account usage in CI/CD.
3) Data collection – Collect Windows Security events, Sysmon, and EDR telemetry. – Aggregate SMB and RPC network metadata. – Log secrets manager access and rotations.
4) SLO design – Define detection SLOs: e.g., detect suspicious credential misuse within 15 minutes 95% of the time. – Define containment SLOs: isolate compromised host within 5 minutes.
5) Dashboards – Build executive, on-call, debug dashboards as outlined above.
6) Alerts & routing – Implement tiered alerts: informational, actionable ticket, paging incident. – Integrate automated containment for high-confidence events.
7) Runbooks & automation – Create runbooks for credential compromise with steps to isolate, rotate, and remediate. – Automate quarantine of host and forced rotation of implicated credentials.
8) Validation (load/chaos/game days) – Run purple team tests with controlled PtH simulations. – Conduct chaos exercises to validate isolation automation. – Perform game days to exercise incident response.
9) Continuous improvement – Post-incident reviews and adjust detections. – Rotate and decommission legacy protocols progressively. – Track metrics and SLOs and refine alert thresholds.
Checklists:
Pre-production checklist
- Inventory legacy auth endpoints.
- Verify logging pipelines exist.
- Test EDR coverage on representative hosts.
- Ensure secrets manager integration for CI/CD.
Production readiness checklist
- Alerts configured and tested.
- Runbooks available and accessible.
- Automated rotation enabled where possible.
- Backups and forensics capture tested.
Incident checklist specific to pass the hash
- Isolate suspected host(s).
- Snapshot memory and disk for forensics.
- Rotate impacted service credentials and keys.
- Revoke sessions and force re-authentication for implicated accounts.
- Search for lateral movement traces and indicators.
Use Cases of pass the hash
Provide 8โ12 use cases with concise fields.
- Use case: Red team credential replay testing
- Context: Security validation.
- Problem: Ensure detection and response to lateral movement.
- Why PtH helps: Realistic simulation of adversary behavior.
- What to measure: Time to detect and contain.
-
Typical tools: EDR, SIEM, AD audit.
-
Use case: Legacy app migration assessment
- Context: Identifying NTLM dependencies.
- Problem: Unplanned failures during NTLM removal.
- Why PtH helps: Surface services accepting hash-based auth.
- What to measure: Percentage of services requiring NTLM.
-
Typical tools: App logs, network analysis.
-
Use case: CI/CD service account hardening
- Context: Build agents using stored creds.
- Problem: Shared credentials across pipelines.
- Why PtH helps: Tests for reuse and lateral access.
- What to measure: Service account usage count.
-
Typical tools: Secrets manager, pipeline logs.
-
Use case: Hybrid cloud identity risk assessment
- Context: Azure AD Connect with on-prem AD.
- Problem: Compromise on-prem propagates to cloud.
- Why PtH helps: Demonstrates lateral risk across trust boundaries.
- What to measure: Sync account exposures and MFA coverage.
-
Typical tools: AD audit, cloud audit logs.
-
Use case: Incident response tabletop
- Context: War-room practice.
- Problem: Readiness to respond to credential theft.
- Why PtH helps: Exercises post-compromise procedures.
- What to measure: Runbook execution time.
-
Typical tools: Simulated logs, checklists.
-
Use case: Regulatory compliance audit
- Context: Demonstrating controls for privileged access.
- Problem: Proving rotation and least privilege.
- Why PtH helps: Provide evidence of mitigation.
- What to measure: Rotation frequency and MFA coverage.
-
Typical tools: IAM audit reports, secrets manager logs.
-
Use case: File server protection
- Context: Sensitive file shares accessed via SMB.
- Problem: Lateral access to file servers via hash replay.
- Why PtH helps: Identifies weak authentication points.
- What to measure: Access patterns and anomalies.
-
Typical tools: File access logs, DLP.
-
Use case: Dev environment segregation
- Context: Developer machines with elevated rights.
- Problem: Developer hashes used for production access.
- Why PtH helps: Shows need for segmentation and ephemeral creds.
- What to measure: Cross-environment authentication occurrences.
- Typical tools: Network segmentation controls, EDR.
Scenario Examples (Realistic, End-to-End)
Scenario #1 โ Kubernetes Windows node lateral move
Context: Hybrid cluster with Windows nodes in Kubernetes. Goal: Detect and contain PtH-style lateral movement originating from a compromised Windows pod node. Why pass the hash matters here: Windows node memory or mounted volumes can leak hashes that enable lateral moves to other cluster nodes or on-prem hosts. Architecture / workflow: Kubernetes running mixed Windows/Linux nodes; Windows node joined to AD; EDR and node logging forward to SIEM. Step-by-step implementation:
- Ensure EDR runs on Windows nodes.
- Forward kubelet and node system logs to SIEM.
- Monitor NTLM auths originating from node IPs.
- Create playbook to cordon node and rotate implicated service accounts. What to measure: Detection time for cross-host NTLM auths; number of nodes with suspicious auths. Tools to use and why: EDR on nodes for memory events; SIEM for correlation; Kubernetes API for isolating node. Common pitfalls: Missing EDR on Windows nodes; assuming K8s RBAC covers host auth. Validation: Purple team simulating extraction and replay against another node. Outcome: Faster detection and automated node isolation reduce lateral movement.
Scenario #2 โ Serverless connector with stored legacy creds (serverless/PaaS)
Context: Serverless function uses a legacy connector to on-prem SMB share using cached service account hash. Goal: Eliminate stored long-lived hashes and replace with ephemeral access. Why pass the hash matters here: Compromise of function or its environment could reveal reusable hashes with access to sensitive shares. Architecture / workflow: Serverless trigger calls connector -> connector authenticates to SMB using stored hash. Step-by-step implementation:
- Inventory serverless functions and connectors.
- Replace stored creds with secrets manager tokens.
- Implement vault short TTL for connectors.
- Monitor secret access patterns. What to measure: Number of functions using long-lived creds; rotation frequency. Tools to use and why: Secrets manager, function logs, SIEM. Common pitfalls: Breaking integration by rotating credentials too aggressively. Validation: Integration tests and staged rollouts. Outcome: Reduced exposure and fewer potential replay targets.
Scenario #3 โ Incident-response postmortem (response)
Context: Production breach where attacker used PtH to access database servers. Goal: Understand the attack chain and improve detections. Why pass the hash matters here: Hash replay enabled movement from compromised dev host into prod DB servers. Architecture / workflow: On-prem AD, database servers, and centralized logging. Step-by-step implementation:
- Triage using SIEM to identify hosts with NTLM auths to DB hosts.
- Capture memory and disk images of suspected hosts.
- Rotate DB service accounts and revoke sessions.
- Rebuild compromised hosts and remediate footholds. What to measure: Time from compromise to detection; scope of accounts used. Tools to use and why: EDR, SIEM, AD auditing. Common pitfalls: Not capturing volatile memory quickly; incomplete credential rotations. Validation: Postmortem with timeline and action items. Outcome: Improved detection rules and mandatory MFA on DB access.
Scenario #4 โ Cost vs performance trade-off (cost/performance)
Context: Org deciding between full secrets manager rollout vs partial plus legacy (cost constrained). Goal: Balance security with operational cost. Why pass the hash matters here: Leaving some services with long-lived secrets increases PtH risk; full migration costly. Architecture / workflow: Mixed environment with critical apps migrated first. Step-by-step implementation:
- Prioritize migration by risk (high-value assets first).
- Implement rotation and vault for critical services.
- Monitor NTLM usage to identify remaining risk.
- Plan phased migration for lower-risk services. What to measure: Cost of secrets manager vs estimated risk reduction. Tools to use and why: Secrets manager for critical; SIEM for monitoring residual NTLM. Common pitfalls: Underestimating integration effort. Validation: Cost-benefit analysis and staged rollout. Outcome: Risk reduction for critical assets while managing cost.
Common Mistakes, Anti-patterns, and Troubleshooting
List of mistakes with Symptom -> Root cause -> Fix. Include observability pitfalls.
- Symptom: No alerts on lateral auths -> Root cause: Incomplete log aggregation -> Fix: Centralize Windows logs to SIEM.
- Symptom: Frequent false positives -> Root cause: Overly sensitive rules -> Fix: Tune thresholds and add context filters.
- Symptom: EDR misses memory extraction -> Root cause: Agent gaps or outdated tooling -> Fix: Ensure EDR coverage and updates.
- Symptom: Blind spot for SMB traffic -> Root cause: No network monitoring east-west -> Fix: Deploy internal network telemetry.
- Symptom: Persistent access after rotation -> Root cause: Stale sessions not revoked -> Fix: Revoke tokens and force logouts.
- Symptom: Alerts not actionable -> Root cause: Lack of runbooks -> Fix: Create clear runbooks and automation.
- Symptom: Overreliance on NTLM disablement -> Root cause: Not identifying legacy dependencies -> Fix: Inventory and staged migration.
- Symptom: CI pipelines break after rotation -> Root cause: Hard-coded creds in scripts -> Fix: Migrate to secrets manager and update scripts.
- Symptom: High cost of logging -> Root cause: Excessive verbose logging without sampling -> Fix: Optimize retention and sampling.
- Symptom: Legal/ops constraint prevents memory capture -> Root cause: Policy or privacy concerns -> Fix: Define minimally invasive forensic process and legal paths.
- Symptom: Attackers use cloud API instead of NTLM -> Root cause: Focus only on Windows โ Fix: Broaden identity telemetry across cloud services.
- Symptom: MFA not enforced for service accounts -> Root cause: Service compatibility assumptions -> Fix: Re-architect to use managed identities.
- Symptom: Too many similar alerts -> Root cause: Lack of deduping -> Fix: Group alerts by principal and window.
- Symptom: No visibility into short-lived VM auths -> Root cause: Missing ephemeral credential logs -> Fix: Capture cloud audit logs and token issuance.
- Symptom: Detection rules outdated -> Root cause: Evolving attacker techniques -> Fix: Regular red-team testing and rule updates.
- Symptom: Investigations take too long -> Root cause: No correlation between endpoint and network data -> Fix: Integrate telemetry sources.
- Symptom: Excessive manual rotations -> Root cause: No automation -> Fix: Automate rotation via secrets management.
- Symptom: Missed privilege escalations -> Root cause: Lack of AD monitoring for admin group changes -> Fix: Audit group membership changes.
- Symptom: Observability gap during maintenance -> Root cause: Suppressing alerts blindly -> Fix: Use maintenance mode with audit trail.
- Symptom: Misinterpreting Kerberos tickets as PtH -> Root cause: Terminology confusion -> Fix: Train teams on difference between tickets and hashes.
- Symptom: Overloading SIEM with raw pcap -> Root cause: Not extracting metadata -> Fix: Preprocess network captures to extract relevant fields.
- Symptom: Failure to contain due to slow tooling -> Root cause: Manual host isolation -> Fix: Automate containment actions in EDR.
- Symptom: Poor postmortem outcomes -> Root cause: No documented TL;DR or actionable items -> Fix: Standardize postmortem outputs with remediation owner.
Observability pitfalls (included above):
- Missing log sources.
- No cross-source correlation.
- Excessive noise without context.
- Lack of network east-west telemetry.
- Delayed or missing forensic captures.
Best Practices & Operating Model
Ownership and on-call:
- Assign clear ownership for identity hygiene (IAM team) and host security (SRE/security team).
- On-call rotations should include at least one identity-aware responder for incidents involving PtH.
Runbooks vs playbooks:
- Runbooks: Step-by-step operational tasks for containment and recovery.
- Playbooks: High-level coordination activities for incident management.
- Keep runbooks concise and executable, with automation hooks.
Safe deployments:
- Use canary deployments for changes like enforcing Kerberos-only policies.
- Implement rollback automation that can revert auth changes quickly.
Toil reduction and automation:
- Automate rotation of service credentials via vaults.
- Use scripts to revoke sessions and rotate across impacted hosts.
- Automate containment with EDR policy triggers.
Security basics:
- Enforce MFA for all privileged accounts.
- Deploy Credential Guard and LAPS on Windows estate.
- Remove unnecessary NTLM support and move to Kerberos or modern auth.
- Adopt zero trust principles: continuous verification, least privilege, microsegmentation.
Weekly/monthly routines:
- Weekly: Review NTLM usage metrics and alerts.
- Monthly: Audit privileged account membership and rotation schedules.
- Quarterly: Purple team exercise and incident response drill.
What to review in postmortems related to pass the hash:
- Root cause and exploited auth paths.
- Detection and response timelines vs SLOs.
- Tokens and secrets exposed and rotation status.
- Automation gaps and follow-up actions.
Tooling & Integration Map for pass the hash (TABLE REQUIRED)
| ID | Category | What it does | Key integrations | Notes |
|---|---|---|---|---|
| I1 | EDR | Detects endpoint credential access behaviors | SIEM, Orchestration | Crucial for memory and process telemetry |
| I2 | SIEM | Correlates logs and alerts | EDR, AD, Network | Central hub for detection rules |
| I3 | Secrets manager | Stores and rotates credentials | CI/CD, Cloud IAM | Reduces long-lived secret exposure |
| I4 | Network monitoring | Captures SMB and NTLM traffic patterns | SIEM, Packet stores | Detects relay and on-wire misuse |
| I5 | AD audit tools | Monitors domain activity | SIEM, EDR | Direct AD visibility for auth events |
| I6 | Vault automation | Automates rotation and revocation | CI/CD, Orchestration | Lowers toil for rotations |
| I7 | Forensics toolkit | Memory and disk capture and analysis | EDR, Storage | Required for post-compromise analysis |
| I8 | Orchestration | Automates containment playbooks | EDR, SIEM | Speeds response and reduces human error |
| I9 | Vulnerability scanner | Identifies legacy protocol usage | CMDB, Asset inventory | Helps prioritize migration |
| I10 | DLP | Prevents sensitive data exfiltration | Network, Storage | Limits impact after compromise |
Row Details (only if needed)
- None.
Frequently Asked Questions (FAQs)
What exactly is stolen in pass the hash?
A hashed representation of the credential (e.g., NTLM hash) rather than the plaintext password.
Can pass the hash be prevented entirely?
Not entirely in mixed legacy environments; risk can be greatly reduced with mitigations like Credential Guard, LAPS, MFA, and eliminating NTLM.
Does enabling Kerberos stop pass the hash?
Kerberos reduces PtH attack surface but does not eliminate other replay or ticket-based attacks.
Are Linux systems immune to pass the hash?
Linux has different authentication mechanisms; PtH is primarily a Windows/NTLM phenomenon but credential replay concepts can exist elsewhere.
How does MFA affect pass the hash?
MFA blocks many interactive replay attempts by adding an additional factor, though non-interactive service accounts may be unaffected.
Is hash cracking required for pass the hash?
No; PtH reuses the hash directly without cracking to plaintext.
What logging is most important to detect PtH?
Windows Security events, Sysmon, SMB auth logs, and EDR telemetry.
Should we disable NTLM globally?
Disable where feasible after inventory and testing; staged removal with monitoring is recommended.
How does secrets management help?
Secrets managers reduce long-lived credential exposure by centralizing storage and rotation with short TTLs.
Can cloud identity eliminate PtH risk?
Adopting cloud IAM and ephemeral tokens reduces PtH risk but hybrid links to on-prem AD can reintroduce exposure.
What is the role of network segmentation?
Segmentation limits lateral movement so stolen hashes cannot be used to reach high-value targets.
How often should service credentials rotate?
Depends on risk; start with weekly to monthly for privileged accounts and shorter for critical services.
Do modern Windows features stop PtH?
Features like Credential Guard and LAPS significantly reduce extraction risks but require proper deployment.
How to prioritize remediation?
Prioritize domain controllers, privileged accounts, and high-access service accounts first.
Can attackers use PtH remotely across VPNs?
Yes if they have credentials and the auth protocols are accepted across the network; segmentation helps mitigate.
Is pass the hash a top threat in cloud-native environments?
Less so when modern identity and ephemeral access are used, but it remains relevant in hybrid or legacy-connected systems.
What should be in a runbook for PtH incidents?
Containment steps, host isolation, credential rotation, forensic actions, and communication plan.
Conclusion
Pass the hash is a real and practical threat in environments that retain legacy authentication patterns or long-lived credentials. Mitigation blends modern identity architecture, automated secrets management, endpoint protection, and solid observability. A pragmatic approach prioritizes high-value assets, applies progressive hardening, and implements measurable SLOs for detection and response.
Next 7 days plan:
- Day 1: Inventory all NTLM-enabled services and privileged accounts.
- Day 2: Ensure EDR and log forwarding are configured on representative hosts.
- Day 3: Enable high-fidelity Windows authentication auditing and forward to SIEM.
- Day 4: Begin migrating critical service accounts to secrets manager with rotation.
- Day 5: Implement or validate MFA on privileged accounts.
- Day 6: Draft runbooks for detection and containment of credential misuse.
- Day 7: Schedule purple team exercise to validate detections and runbooks.
Appendix โ pass the hash Keyword Cluster (SEO)
- Primary keywords
- pass the hash
- PtH attack
- pass the hash technique
- credential hash replay
-
NTLM pass the hash
-
Secondary keywords
- credential dumping
- NTLM authentication
- Kerberos vs NTLM
- Windows Credential Guard
-
LAPS rotation
-
Long-tail questions
- what is pass the hash attack
- how does pass the hash work in windows
- how to detect pass the hash in enterprise
- pass the hash mitigation best practices
- difference between pass the hash and pass the ticket
- how to prevent ntlm relay and pass the hash
- pass the hash in hybrid cloud environments
- can pass the hash be used against cloud services
- pass the hash incident response checklist
- pass the hash examples and scenarios
- how to measure pass the hash risk
- pass the hash detection analytics
- pass the hash in Kubernetes Windows nodes
- secrets manager to mitigate pass the hash
-
rotating service accounts to reduce PtH risk
-
Related terminology
- NTLM hash
- authentication hash
- hashed credential replay
- security information event management
- endpoint detection and response
- secrets management
- lateral movement
- identity provider
- ephemeral credentials
- multi factor authentication
- Active Directory domain controller
- Kerberos ticket
- pass the ticket
- golden ticket
- AD Connect
- CI/CD secrets
- SMB protocol
- RPC authentication
- memory forensics
- SIEM correlation
- network east-west monitoring
- zero trust identity
- vault automation
- service account rotation
- privileged access management
- authentication replay
- token revocation
- forensic snapshot
- purple team exercise
- incident playbook
- runbook automation
- token theft
- credential hygiene
- security telemetry
- observability for identity
- attack surface reduction
- segmentation for lateral movement
- breach containment
- privilege escalation
- detection SLOs

Leave a Reply