InfoSec_Notes

About

Dumping SAM + SYSTEM is a core persistence/escalation technique - Lateral movement Authenticate to remote services (WinRM, SMB, RDP, PSSessions) using stolen NTML hash of a user’s password. No need to know or crack the password Hash is the ‘ticket’ for NTLM rides”

MITRE ATT&CK

T1550.002 (Use Alternate Authentication Material: Pass the Hash)

Core vulnerability

Windows stores passwords as hashes (one-way cryptographic representations) in the SAM database (for local accounts) or NTDS.dit (for domain accounts).

Protocol flaw

Requirements

To extract local password hashes, you need both:

Common tools

Detection & Mitigation

Logs

Event ID 4624 Logon with logon type Network + no password; unexpected NTLM authN

Mitigate