Content

DeMISTIfying Infosec: Pass-the-Hash

By Katherine Teitler

Broadcast Name Resolution Poisoning

Broadcast name resolution poisoning is an attack targeting user credentials as a means to further access corporate networks and data. To initiate the attack, a threat actor would buy a generic top-level domain (gTLD) and establish attacker-controlled entries for the web proxy auto-discover protocol (WPAD). The attacker spoofs domain name resolutions to which victim computers will then auto-connect, generally when the end user is trying to connect to the internet via an external DNS, such as at a hotel or coffee shop. The spoofed domain responds to authentication requests and can capture authentication credentials.

Hashed passwords, however, are not immune from theft. A pass-the-hash attack is a form of credential theft accomplished through “hash dumping.” “Hash dumping” allows an attacker to gain access to hashed passwords and then use them to navigate through a system. Some common tools for hash dumping include pwdump, Pshtoolkit, creddump, etc. Once an attacker accesses the hashed passwords, he doesn’t need to know actual, plaintext user passwords to perform a pass-the-hash attack.

Single sign-on, in particular, while convenient for users, makes a pass-the-hash attack more viable and allows an attacker to authenticate to private systems or information and migrate from host to host.

Protecting against pass-the-hash attack is the same as for other identity and access management strategies. They include:

  • Implement two-/multi-factor authentication
  • Restrict high privileged accounts (domain, local, and admins)
  • Restrict inbound traffic via firewall
  • Allow domain controllers to be accessed only by air-gapped trusted systems

Get the DeMISTIfying InfoSec newsletter every Tuesday!

 

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds