The Pass-the-Hash attack is a lateral movement technique used in post-exploitation scenarios within Windows environments. Instead of needing to crack a password, attackers use the hashed representation of a password commonly an NTLM hash to authenticate and move laterally across systems.

MITRE ATT&CK ID: T1550.002

image.png


1- Understanding Hash-Based Authentication


2- Steps of a Pass-the-Hash Attack

a. Initial Access

b. Hash Extraction

c. Pass the Hash

d. Lateral Movement and Privilege Escalation