Post

Meow's CyberAttack - Application/Server Attacks - Pass the Hash

book:

  • S+ 7th ch9

Meow’s CyberAttack - Application/Server Attacks - Pass the Hash


Pass the Hash

  • This attack takes advantage of a weakness in the authentication protocol (NTLM and LanMan)
    • in which the password hash remains static from session to session until the password is changed .
    • Attacker send an authenticated copy of the password hash value (along with a valid username) and authenticate to any remote server (Windows, Unix…) that is accepting LM or NTLM authentication.
    • Solution: Disable NTLM
This post is licensed under CC BY 4.0 by the author.

Comments powered by Disqus.