Pass-the-Hash
Authenticate with Stolen NTLM Hashes
Use a stolen NTLM password hash to authenticate as a user without ever knowing their plaintext password — the foundational lateral movement technique.
Prerequisites:NTLM hash of target user (from Mimikatz, SAM dump, etc.)Network access to target host (SMB TCP 445)Target host allows NTLM authentication
1
Obtain NTLM Hash from Mimikatz Output
Pass-the-Hash — Step 1/3
PS C:\Tools>
Click or press Enter to skip
Step 1: Review Stolen Credentials
We have a Domain Admin's NTLM hash from a previous Mimikatz dump. The NTLM hash is a one-way transformation of the password — we don't know the password, but we don't need it.
We have a "password fingerprint" (NTLM hash) from a Domain Admin account. Even though we don't know the actual password, Windows will accept this hash as proof of identity. It's like having a copy of someone's house key without knowing the key's code.
Detection Events
4624Logon Type 9 (NewCredentials)
Attack Flow
Request
Response
Attack
Data