Authenticate without passwords using captured NTLM hashes.
Simulate credential theft from LSASS memory and use the hash to authenticate to remote systems without knowing the plaintext password.
This attack exploits Windows NTLM authentication, allowing attackers to move laterally across networks using stolen credentials.
Pass-the-Hash (PtH) is an attack where an attacker uses a stolen password hash (NTLM) to authenticate as the user, without needing to crack the plaintext password. Windows accepts the hash itself for authentication, making password complexity irrelevant.
Attacker compromises one machine (phishing, exploit, stolen creds)
Use Mimikatz to extract NTLM hashes from LSASS memory or SAM database
Use stolen hash to authenticate to other machines (lateral movement)
Repeat process, move to Domain Controllers, dump all domain hashes
Lateral Movement via NTLM Hash Injection