98年属相是什么| 什么瓜不能吃脑筋急转弯| 低血糖什么不能吃| 吃胡萝卜有什么好处| 大姨妈来了吃什么| 松弛是什么意思| 拔牙后不能吃什么食物| 胰岛素起什么作用| 乌梅是什么水果做的| 高密度脂蛋白胆固醇偏低什么意思| 皮肤长斑是什么原因引起的| 脑瘤是什么原因引起的| 孩子流口水是什么原因引起的| 须尽欢什么意思| 脓毒血症是什么原因引起的| 为什么用英语怎么说| 孕晚期流鼻血是什么原因| 查尿酸挂什么科| 老年人爱出汗是什么原因| 杞人忧天告诉我们什么道理| 棕色短裤配什么颜色上衣| 输血前四项检查是什么| 经理是什么级别| 港澳通行证办理需要什么材料| 什么牌子的蛋白质粉比较好| 十灵日是什么意思| 6.24什么星座| bbs是什么意思| cv什么意思| 女同什么意思| 什么是对的人| 什么是植物神经| 坐飞机要什么证件| a1微球蛋白偏高说明什么意思| 什么是植物人| 体内湿气重吃什么食物| 白细胞低代表什么意思| 灰度是什么意思| 诸葛亮是一个什么样的人| 2月7日什么星座| 羊齿状结晶代表什么| 甲状腺结节挂什么科室| 什么是面首| 血脂高有什么症状| 虾不能跟什么一起吃| 更年期一般在什么年龄| 卡罗莱手表是什么档次| 胰腺炎吃什么| 易孕体质有什么特征| 属猪的护身佛是什么佛| 当家作主是什么生肖| 检查血压挂什么科| 3月5日是什么星座| 鸡肉炒什么好吃| 鹿下面一个几字读什么| 膝盖后面叫什么部位| 什么是化疗| 牙龈和牙齿分离是什么原因| 二月二十五号是什么星座| 吃了榴莲不能吃什么| 螳螂代表什么生肖| 才高八斗是什么意思| 牛仔布料是什么面料| 化疗和靶向有什么区别| 特此通知写在什么位置| 吃了饭胃胀是什么原因| 怀孕第一天有什么症状| 黄粉虫吃什么| 函询是什么意思| 吃得什么填词语| 什么是沉香木| 胸口闷闷的有点疼是什么原因| 扁桃体发炎引起的发烧吃什么药| h型高血压是什么意思| 牙齿脱矿是什么原因| 1987年是什么年| 逆熵是什么意思| 什么原因导致宫外孕| 双插头是什么意思| 总胆红素高说明什么| 心语是什么意思| 小孩便秘有什么办法| 金字旁加匀念什么| 手脚出汗多是什么原因| 京东自营店是什么意思| 春回大地是指什么生肖| 人中长痘痘是什么原因| 白细胞计数偏低是什么原因| 尖锐湿疣吃什么药| 拉屎为什么是绿色的| 纤维是什么意思| 心无什么用| 黄体破裂什么意思| 大象喜欢吃什么食物| 蕙字五行属什么| 外阴过敏用什么药| 胃疼可以吃什么食物| 卵泡排出来是什么样的| 一什么村庄| 424是什么意思| 省委委员是什么级别| 涤纶是什么面料优缺点| 舌苔厚黄是什么病| 斑点狗是什么品种| 凉皮是用什么做的| 7月13号是什么星座| 减肥可以吃什么肉| 脸色发黑是什么原因| 原子序数是什么| 神什么活什么| 血红蛋白偏低吃什么补| 长脸适合什么眉形| 紫字五行属什么| bambi什么意思| elle中文叫什么| 榴莲什么时间段吃最好| 羊后马前对是什么生肖| 采耳是什么意思| nf是什么单位| 肝炎是什么原因引起的| 梦到钱丢了预示着什么| legacy什么意思| 狐狸和乌鸦告诉我们什么道理| 无中生有是什么生肖| 常吃大蒜有什么好处| 烫伤抹什么药膏| 两个人可以玩什么游戏| 臭屁多是什么原因| 七月十三日是什么日子| 荨麻疹长什么样图片| 前列腺炎是什么意思| 华西医院院长什么级别| kelme是什么牌子| 男人后背有痣代表什么| 左氧氟沙星有什么副作用| 小孩白细胞高是什么原因| 高颜值是什么意思| 益字五行属什么| 蚝油是干什么用的| 心肌供血不足吃什么| 一号来的月经排卵期是什么时候| 女性漏尿挂什么科| 莫非的近义词是什么| 消瘦挂什么科| dpl是什么意思| 长脸适合什么眼镜框| 什么的讲| 96年属什么的| 三四月份是什么星座| 心急如焚是什么意思| 做梦大便是什么意思| 宫颈锥切后需要注意什么| 开塞露是干什么用的| 女人绝经一般在什么年龄段| biubiubiu是什么意思| 炮机是什么| ld是什么意思| 瘆人是什么意思| 桂枝茯苓丸治什么病| 梦见春梦是什么意思| 肝内高回声什么意思| 肛门疼痛是什么原因引起的| 5月9号是什么星座| 释迦果吃了有什么好处| mlb中文叫什么| 蛋白尿是什么症状| 花生吃多了有什么坏处| 生理期吃什么水果比较好| 婴儿第一次发烧叫什么| 脂蛋白高是什么原因| 补肾吃什么食物最好| 龟头有白色污垢是什么| 左胸口疼是什么原因| 氯超标是因为什么原因| 鸭肉炖什么好吃| 梦见和死人一起吃饭是什么意思| 皮炎是什么原因引起的| 钢铁侠是什么意思| 痛苦是什么意思| 病毒由什么构成| 漪什么意思| 三点水一个半读什么| 做梦梦到蜈蚣是什么意思| 悲伤是什么意思| 祸起萧墙的萧墙指什么| 手掌心痒是什么原因| 满五唯一的房子要交什么税| 肛门潮湿用什么药| 通情达理是什么意思| 不尽人意是什么意思| 什么背什么腰| 参苓白术散治什么病| 比丘什么意思| 野馄饨是什么意思| 2021年是属什么年| 大力丸是什么| 关节炎看什么科| 黄皮是什么| 为什么射出的精子里有淡红色| 1998年属什么生肖| 手指缝里长水泡还痒是什么原因| 饕餮长什么样| 一天中什么时候最热| walls是什么意思| 城市户口和农村户口有什么区别| 嬲是什么意思| 陶土色是什么颜色| 运钞车押运员是什么人| romantic是什么意思| 藏红花有什么作用| 言字旁有什么字| 饱胀是什么意思| 零和博弈是什么意思| 为什么眉毛越来越少| 蜘蛛吃什么| 湖北有什么好玩的地方| 金银花为什么叫忍冬| 脖子左侧疼是什么原因| 新疆有什么民族| 晚上睡觉腿酸难受是什么原因| 尿路感染看什么科室| 代谢慢是什么原因| 脸上涂什么可以美白| camel是什么牌子| rr是什么牌子| 禁忌是什么意思| 女人右手中指有痣代表什么| 小壁虎进家有什么预兆| 海虫草是什么| 戒指戴在食指什么意思| 胃胀气是什么原因引起的| 松花蛋是什么蛋| 碳酸氢钠俗称什么| 双肾尿盐结晶是什么| 羽毛球拍磅数是什么意思| 肛门裂口是用什么药膏| 卖点是什么意思| 7月15是什么星座的| pcv是什么意思| 人体自由基是什么| 冠状沟溃疡是什么病| 1110是什么星座| 膝盖小腿酸软无力是什么原因| mcn是什么意思| 螺蛳粉是什么做的| 8月15号什么星座| 来月经有什么症状| 木羽念什么| 蚊子怕什么气味| 运动减肥为什么体重不减反增| 老人肚子胀是什么原因| 慢性非萎缩性胃炎伴糜烂是什么意思| 泛醇是什么| 精血是什么| 病毒由什么组成| 肠梗阻有什么症状| 总头晕是什么原因| 什么什么一笑| 痰多吃什么好| emr是什么意思| 消渴病是什么病| 婴儿42天检查什么项目| 邓紫棋和华晨宇什么关系| 脖子长痘痘是因为什么原因| 百度Jump to content

航拍九景衢铁路 “千年瓷都”景德镇进入动车时代

From Wikipedia, the free encyclopedia
百度 他强调,在这个算法驱动横行的时代,人工智能将使媒体理想成为多余,甚至过时。

In computer security, pass the hash is a hacking technique that allows an attacker to authenticate to a remote server or service by using the underlying NTLM or LanMan hash of a user's password, instead of requiring the associated plaintext password as is normally the case. It replaces the need for stealing the plaintext password to gain access with stealing the hash.

The attack exploits an implementation weakness in the authentication protocol, where password hashes remain static from session to session until the password is next changed.

This technique can be performed against any server or service accepting LM or NTLM authentication, whether it runs on a machine with Windows, Unix, or any other operating system.

Description

[edit]

On systems or services using NTLM authentication, users' passwords are never sent in cleartext over the wire. Instead, they are provided to the requesting system, like a domain controller, as a hash in a response to a challenge–response authentication scheme.[1]

Native Windows applications ask users for the cleartext password, then call APIs like LsaLogonUser[2] that convert that password to one or two hash values (the LM or NT hashes) and then send that to the remote server during NTLM authentication.[Notes 1][3]

If an attacker has the hashes of a user's password, they do not need the cleartext password; they can simply use the hash to authenticate with a server and impersonate that user.[4][5][6] In other words, from an attacker's perspective, hashes are functionally equivalent to the original passwords that they were generated from.

History

[edit]

The pass the hash technique was originally published by Paul Ashton in 1997[6] and consisted of a modified Samba SMB client that accepted user password hashes instead of cleartext passwords. Later versions of Samba and other third-party implementations of the SMB and NTLM protocols also included the functionality.

This implementation of the technique was based on an SMB stack created by a third-party (e.g., Samba and others), and for this reason suffered from a series of limitations from a hacker's perspective, including limited or partial functionality: The SMB protocol has continued to evolve over the years, this means that third parties creating their own implementation of the SMB protocol need to implement changes and additions to the protocol after they are introduced by newer versions of Windows and SMB (historically by reverse engineering, which is very complex and time-consuming). This means that even after performing NTLM authentication successfully using the pass the hash technique, tools like Samba's SMB client might not have implemented the functionality the attacker might want to use. This meant that it was difficult to attack Windows programs that use DCOM or RPC.

Also, because attackers were restricted to using third-party clients when carrying out attacks, it was not possible to use built-in Windows applications, like Net.exe or the Active Directory Users and Computers tool amongst others, because they asked the attacker or user to enter the cleartext password to authenticate, and not the corresponding password hash value.

In 2008, Hernan Ochoa published a tool called the "Pass-the-Hash Toolkit"[7] that allowed 'pass the hash' to be performed natively on Windows. It allowed the user name, domain name, and password hashes cached in memory by the Local Security Authority to be changed at runtime after a user was authenticated — this made it possible to 'pass the hash' using standard Windows applications, and thereby to undermine fundamental authentication mechanisms built into the operating system.

The tool also introduced a new technique which allowed dumping password hashes cached in the memory of the lsass.exe process (not in persistent storage on disk), which quickly became widely used by penetration testers (and attackers). This hash harvesting technique is more advanced than previously used techniques (e.g. dumping the local Security Accounts Manager database (SAM) using pwdump and similar tools), mainly because hash values stored in memory could include credentials of domain users (and domain administrators) that logged into the machine. For example, the hashes of authenticated domain users that are not stored persistently in the local SAM can also be dumped. This makes it possible for a penetration tester (or attacker) to compromise a whole Windows domain after compromising a single machine that was a member of that domain. Furthermore, the attack can be implemented instantaneously and without any requirement for expensive computing resources to carry out a brute force attack.

This toolkit has subsequently been superseded by "Windows Credential Editor", which extends the original tool's functionality and operating system support.[8][9] Some antivirus vendors classify the toolkit as malware.[10][11]

Hash harvesting

[edit]

Before an attacker can carry out a pass-the-hash attack, they must obtain the password hashes of the target user accounts. To this end, penetration testers and attackers can harvest password hashes using a number of different methods:

  • Cached hashes or credentials of users who have previously logged onto a machine (for example at the console or via RDP) can be read from the SAM by anyone who has Administrator-level privileges. The default behavior of caching hashes or credentials for offline use can be disabled by administrators, so this technique may not always work if a machine has been sufficiently hardened.
  • Dumping the local user's account database (SAM). This database only contains user accounts local to the particular machine that was compromised. For example, in a domain environment, the SAM database of a machine will not contain domain users, only users local to that machine that more likely will not be very useful to authenticate to other services on the domain. However, if the same local administrative account passwords are used across multiple systems the attacker can remotely access those systems using the local user account hashes.
  • Sniffing LM and NTLM challenge–response dialogues between client and servers, and later brute-forcing captured encrypted hashes (since the hashes obtained in this way are encrypted, it is necessary to perform a brute-force attack to obtain the actual hashes).
  • Dumping authenticated users' credentials stored by Windows in the memory of the lsass.exe process. The credentials dumped in this way may include those of domain users or administrators, such as those logged in via RDP. This technique may therefore be used to obtain credentials of user accounts that are not local to the compromised computer, but rather originate from the security domain that the machine is a member of.

Mitigations

[edit]

Any system using LM or NTLM authentication in combination with any communication protocol (SMB, FTP, RPC, HTTP etc.) is at risk from this attack.[1] The exploit is very difficult to defend against, due to possible exploits in Windows and applications running on Windows that can be used by an attacker to elevate their privileges and then carry out the hash harvesting that facilitates the attack. Furthermore, it may only require one machine in a Windows domain to not be configured correctly or be missing a security patch for an attacker to find a way in. A wide range of penetration testing tools are furthermore available to automate the process of discovering a weakness on a machine.

There is no single defense against the technique, thus standard defense in depth practices apply[12] – for example use of firewalls, intrusion prevention systems, 802.1x authentication, IPsec, antivirus software, reducing the number of people with elevated privileges,[13] pro-active security patching[14] etc. Preventing Windows from storing cached credentials may limit attackers to obtaining hashes from memory, which usually means that the target account must be logged into the machine when the attack is executed.[15] Allowing domain administrators to log into systems that may be compromised or untrusted will create a scenario where the administrators' hashes become the targets of attackers; limiting domain administrator logons to trusted domain controllers can therefore limit the opportunities for an attacker.[12] The principle of least privilege suggests that a least user access (LUA) approach should be taken, in that users should not use accounts with more privileges than necessary to complete the task at hand.[12] Configuring systems not to use LM or NTLM can also strengthen security, but newer exploits are able to forward Kerberos tickets in a similar way.[16] Limiting the scope of debug privileges on system may frustrate some attacks that inject code or steal hashes from the memory of sensitive processes.[12]

Restricted Admin Mode is a new Windows operating system feature introduced in 2014 via security bulletin 2871997, which is designed to reduce the effectiveness of the attack.[17]

See also

[edit]

Notes

[edit]
  1. ^ Note that Windows may use Kerberos authentication by default.

References

[edit]
  1. ^ a b Chris Hummel (12 October 2009). "Why Crack When You Can Pass the Hash?". SANS Institute. {{cite journal}}: Cite journal requires |journal= (help)
  2. ^ "LsaLogonUser". Microsoft. 7 September 2011. Retrieved 25 October 2011.
  3. ^ "How Interactive Logon Works". Microsoft. 22 January 2009. Retrieved 25 October 2011.
  4. ^ "What is a Pass-the-Hash Attack (PtH)?". BeyondTrust. 2025-08-14. Archived from the original on 2025-08-14. Retrieved 2025-08-14.
  5. ^ Lenaerts-Bergmans, Bart (2025-08-14). "What is a Pass-the-Hash Attack?". crowdstrike.com. Archived from the original on 2025-08-14. Retrieved 2025-08-14.
  6. ^ a b Daniel Stirnimann (9 August 2010). "Windows Attack — Gain Enterprise Admin Privileges in 5 Minutes" (PDF). Compass Security AG. Archived from the original (PDF) on August 26, 2014. Retrieved 10 October 2010.
  7. ^ Hernan Ochoa (2 July 2008). "What is Pass-The-Hash Toolkit?". Retrieved 20 October 2011.
  8. ^ Hernan Ochoa (2011). WCE Internals. RootedCON.
  9. ^ Hernan Ochoa (2011). "Windows Credentials Editor (WCE) F.A.Q." Amplia Security. Retrieved 25 October 2011.
  10. ^ "SecurityRisk.WinCredEd". Symantec. 21 March 2011. Archived from the original on April 13, 2012. Retrieved 25 October 2011.
  11. ^ "HackTool:Win32/Wincred.A". Microsoft. 1 October 2011. Retrieved 25 October 2011.
  12. ^ a b c d Bashar Ewaida (21 January 2010). "Pass-the-hash attacks: Tools and Mitigation". SANS Institute. {{cite journal}}: Cite journal requires |journal= (help)
  13. ^ Roger Grimes (26 July 2011). "Stop pass-the-hash attacks before they begin". InfoWorld. Retrieved 25 October 2011.
  14. ^ Rob Kraus; Brian Barber; Mike Borkin; Naomi Alpern (2010). Seven Deadliest Microsoft Attacks. Syngress. pp. 12–14. ISBN 978-1-59749-551-6.
  15. ^ "Preventing Pass-the-Hash Attacks and Cached Credential Attacks". Berkley Lab Computer Protection Program. Archived from the original on 4 May 2011. Retrieved 20 October 2011.
  16. ^ "Microsoft Windows Kerberos 'Pass The Ticket' Replay Security Bypass Vulnerability". securityfocus.com. 13 August 2010. Archived from the original on 12 March 2016. Retrieved 20 October 2010.
  17. ^ "Microsoft Security Advisory 2871997". 14 October 2022.
[edit]
梦见冬瓜是什么意思 病人打白蛋白意味着什么 嘴唇发紫是什么病 美乃滋是什么 韭菜籽配什么壮阳最猛
珍珠婚是什么意思 做肠镜前喝的是什么药 持续耳鸣是什么原因引起的 谨记的意思是什么 科目三考什么内容
肾阴虚吃什么药最好 钾在人体中起什么作用 液基细胞学检查是什么 jnby是什么牌子 澄面粉是什么面粉
守望先锋是什么类型的游戏 1月11日是什么星座 早上起床眼屎多是什么原因 什么事情只能用一只手去做 什么可以驱蛇
吃什么补免疫力最快hcv8jop4ns8r.cn 什么的蘑菇hcv7jop9ns6r.cn 甲状腺桥本是什么意思hcv8jop5ns0r.cn 为什么家里有蟑螂hcv7jop6ns3r.cn 晚饭吃什么减肥creativexi.com
成吉思汗是什么意思hcv9jop5ns0r.cn 闰年是什么hcv8jop6ns0r.cn 唇炎抹什么药膏最有效hcv8jop1ns4r.cn 监测是什么意思hcv7jop9ns7r.cn 闭关是什么意思hcv8jop8ns6r.cn
西湖醋鱼是什么鱼hcv8jop1ns8r.cn 小叶增生吃什么药好hcv9jop6ns3r.cn 新疆人是什么人种hcv7jop6ns1r.cn 扁桃体肿大吃什么药好hcv8jop6ns3r.cn 根管预备是什么意思youbangsi.com
心包积液挂什么科yanzhenzixun.com 血压偏低是什么原因hcv9jop6ns2r.cn 什么是作风建设baiqunet.com 什么七什么八youbangsi.com 象牙有什么作用与功效huizhijixie.com
百度