PtH (Pass The Hash Saldırısı) | General Hacking | Crax

Welcome To Crax.Pro Forum!

Check our new Marketplace at Crax.Shop

   Login! SignUp Now!
  • We are in solidarity with our brothers and sisters in Palestine. Free Palestine. To learn more visit this Page

  • Crax.Pro domain has been taken down!

    Alternatives: Craxpro.io | Craxpro.com

PtH (Pass The Hash Saldırısı)

PtH (Pass The Hash Saldırısı)

LV
1
 

cerrahp

Member
Joined
Feb 10, 2023
Threads
10
Likes
9
Awards
4
Credits
931©
Cash
0$
What is Pass The Hash?

40bykw5.png



Passwords are very important for our security, and to crack these passwords, they can be cracked or stolen with offensive actions such as Brute Force, Phising Attack.


This type of Attack was first published by Paul Ashton in 1997 and consisted of a customized Samba client that accepts user password hashes instead of clear text passwords. Later versions of Samba, other third-party implementations of the SMB and NTLM protocols also included functionality


As you know, important passwords are kept by hashing on servers (Windows Server), Database servers.

Those who use SQLMap will understand well, you have made a database attack and you will dump the password, when you dump, the passwords will reach us encrypted with a hash.



89k214c.png



We use the Pass The Hash attack to access the target system by stealing the hash password's information from the cache, so we can show dominance as a Super User.

Attackers often use the Pass The Hash attack to capture domains


8sl8z9o.png



An attacker uses a Pass The Hash attack to steal multiple user information and credentials without having to crack a password. The attacker allows him to use a compromised account without receiving a text password or disclosing the password using the brute force method.



Pass The Hash And Windows

Pass The Hash attacks are usually used on Windows systems, it can be an operating system ( Windows Vista, 7, 8, 10 , 11 ) or Windows Servers, in addition, other operating systems with Linux distribution can also be threatened by this attack.


SSO, that is, due to the single login feature, SSO is the first target, since users need to enter their passwords only once to access all resources on Windows.

1wlsv82.png

In October, the SSO additionally requires the caching of users' or the user's personal information in the system, which makes it easier for attackers to access the system.


NTLM (New Technology Lan Manager) hashes are fixed-length code scripts created from passwords used to authenticate users. Windows systems do not send or save user passwords over the network due to security policy. Instead, it saves passwords as encrypted NTLM, which represents the password.



ga5iqhw.jpg



Attackers who have Super user do, that is, Administrator privileges from a user account with a security breach, can use the Pass The Hash method to trick Windows real users as fake users.


When a system with malware installed is added to a Windows machine with compromised software security, it can use NTLM code scripts instead of a password to access any desired resource, take over and obtain higher user privileges, and search for other accounts.



Protection from Pass The Hash Attack



Although new Window distributions, namely Windows 10 – Windows 11 systems, have partially taken precautions against this attack, Pass The Hash is a difficult attack to detect and attacks are still a valid method for cybercriminals to compromise endpoints and exploit networks.



Pass The Hash attacks can only work when an attacker has access to your network. To prevent a Pass The Hash attack, it is important to protect access to network privileges, and unfortunately, friends, most of us don't even encrypt system files, even if we encrypt our system files, we will have taken a small precaution against most Pass The Hash attacks.



Against the Pass The Hash method, separate privileged and non-privileged accounts should be created that allow your Information Technology managers to use a standard account without privileged network access for their daily tasks, such as checking emails.



This measure only privileged access is required so the domain administrator account when you use something like this means that they can basically everyone unauthorised persons within the jurisdiction and powers beyond the jurisdiction of user accounts must be opened in this way we should, in any form of attack , the attacker will not be propagated further to the system or because there is less traffic to the firewall will be caught more easily.



Important system logins need to be given double-factor verification, so that even if the attacker decrypts the password 2.layers will come in.



LOGS should be kept regularly and the LOG records kept should be examined regularly.

Most IT Administrators cannot set up their systems to keep regular LOGS LOG Policies must be set.



Old security systems and communication protocols should be abandoned and switched to more secure protocols, such as NTLMv2 or Kerberos.



In addition , information technology administrator accounts password policies ( policy settings Say ) much more stringent and complex passwords from other accounts will be password and domain administrator accounts, you can implement a plan for the renewal cycle.



Ordinary passwords are always easier to crack, and using the same password for 1 year can make the system more vulnerable, so if I give an example in this regard, as long as I change the password once a week, I will avoid Brute Force attacks, and the attacker will have to change the wordlist he created again.



As a result, you need to apply a strategy to restrict access to privileged accounts and Also passwords for Windows workstations by eliminating the need for ayrilacalikli your end users , endpoint Application Control provides solutions that implement least privilege, you should look for.
 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Tips
Tips
Top Bottom