Alert icon Keyboard navigation enabled.
Alert icon TAB or Shift+TAB to navigate across. Down ↓ to open menu. ESC to close menu.
Alert icon Down ↓ to select section. Right → to activate. Up ↑ / Down ↓ / Tab to traverse all. ESC to exit.
BeyondTrust
Skip to content Use space or enter to skip.

What can we help you find today?

Contact Us Chat with Sales Get Support
  • English
  • Deutsch
  • français
  • español
  • 한국어
  • português

Info icon Announcement: BeyondTrust a 7X Gartner® Magic Quadrant™ Leader for Privileged Access Management! Access the Report Now

  • Home
  • Resources
  • Glossary
  • Pass-the-Hash Attack (PtH) current page
Link copied

Pass-the-Hash Attack (PtH)

Resource default

What is a Pass-the-Hash (PtH) Attack?

White chain icon to symbolize the ability to copy a link
Link copied
Check mark to visually show text has been copied

A Pass-the-Hash (PtH) attack is a technique where an attacker captures a password hash (as opposed to the password characters). The threat actor then passes it through for authentication and lateral access to other networked systems. With this technique, the threat actor doesn’t need to decrypt the hash to obtain a plain text password. PtH attacks exploit the authentication protocol, as the passwords hash remains static for every session until the password is rotated. Attackers can obtain hashes by scraping a system’s active memory, along with other techniques.

While Pass-the-Hash attacks can occur on Linux, Unix, and other platforms, they are most prevalent on Windows systems. In Windows, PtH exploits Single Sign-On (SSO) through NT Lan Manager (NTLM), Kerberos, and other authentication protocols. When a password is created in Windows, it is hashed and stored in one of the following locations:

  • The Security Accounts Manager (SAM)
  • The Local Security Authority Subsystem (LSASS) process memory
  • A Credential Manager (CredMan) store
  • A ntds.dit database in Active Directory
  • Or elsewhere

When a user logs onto a Windows workstation or server, they essentially leave behind their password credentials.

A pass-the-ticket attack is a similar password-based attack but instead, the threat actor steals a Kerberos ticket-granting ticket (TGT). Once the TGT has been stolen from one identity, they can then use it to impersonate that user on a network. This tactic bypasses authentication mechanisms and enables the attacker to gain illicit access to resources.

How to Prevent Pass-the-Hash Attacks

White chain icon to symbolize the ability to copy a link
Link copied
Check mark to visually show text has been copied

For a PtH attack to succeed, the perpetrator must first gain local administrative access on a computer to lift the hash. Once the attacker has a foothold, they can move laterally with relative ease, lifting more credentials and escalating privileges along the way.

Implementing the following security best practices will help eliminate, or at least minimize, the impact of a PtH attack:

  • Least Privilege Security Model: Limits the scope and mitigates the impact of a PtH attack by reducing an attacker's ability to escalate privileged access and permissions. Removing unnecessary admin rights goes a long way in reducing the threat surface for PtH and many other types of attacks.
  • Password Management Solutions: Rotating passwords frequently (and/or after a known credential compromise) can condense the window of time during which a stolen hash remains valid. By automating password rotation to occur after each privileged session, you can completely thwart PtH attacks and other exploits that rely on password reuse. The use of one-time-passwords (OTPs) can also mitigate PtH threats, as an OTP may only be valid for a single login session.
  • Separation of Privileges: Separating different types of privileged and non-privileged accounts can reduce the scope of usage for administrator accounts. It reduces the risks of compromise and opportunities for lateral movement.

Learn how BeyondTrust can protect you against pass-the-hash, pass-the-ticket, kerberoasts, and other identity-based threats. Contact us today.

Learn More About Identity-Based Threats and Defenses

White chain icon to symbolize the ability to copy a link
Link copied
Check mark to visually show text has been copied
Privileged Password Management Explained

Resources

Privileged Password Management Explained

Defending Against Token-Based Threats

Blog

Defending Against Token-Based Threats

Password Cracking 101: Attacks & Defenses Explained

Blog

Password Cracking 101: Attacks & Defenses Explained

Paths to Privilege™ Explained

Resources

Paths to Privilege™ Explained

Pass-the-Ticket Attacks

Glossary

Pass-the-Ticket Attacks

Kerberoasting

Glossary

Kerberoasting

All Glossary Entries

White chain icon to symbolize the ability to copy a link
Link copied
Check mark to visually show text has been copied
Active Directory Bridging Active Directory Security Admin Rights Application Control Application Password Management Birthright Access Cloud Infrastructure Entitlement Management (CIEM) Cloud Security/Cloud Computing Security Cyber-Attack Chain Cybersecurity DevOps Security Digital Identity Endpoint Security File Integrity Monitoring Guest Account Hardcoded/Embedded Passwords Identity and Access Management (IAM) Identity Attack Surface Management (IASM) Identity Governance and Administration (IGA) Identity Security Just-In-Time Access Kerberoasting Least Privilege Logic Bomb Malware Attack Managed Security Services Provider (MSSP) Managed Services Provider (MSP) MFA Fatigue Attack Orphaned Account OWASP Top 10 Security Risks Pass-the-Hash Attack (PtH) Pass-the-Ticket Attacks Password Password Rotation Password Spraying Privilege Elevation and Delegation Management (PEDM) Privileged Access Management (PAM) Privileged Account and Session Management (PASM) Privileged Accounts Privileged Password Management Privileged Session Management Ransomware Remote Access Secrets Management Secure Socket Shell (SSH) Key Management Separation of Privilege Superuser/Superuser Accounts Systems Hardening User Access Review (UAR) Vulnerability Assessment Vulnerability Scanning Windows Auditing Zero Standing Privileges
Related
  • Ransomware
    Dec 2, 2024 Ransomware
    Glossary
    9m
  • Guest Account
    Aug 6, 2025 Guest Account
    Glossary
    4m
Tags
  • account hijacking
  • Attack
  • credential-based attack
  • Glossary
  • Hash Attack
  • Hash Cyber
  • Hash Learn More
  • Hash Mitigate
  • Hash Secure
  • Hash Security

Keep up with BeyondTrust

Customer Support Get Started
  • LinkedIn
  • X
  • Facebook
  • Instagram
  • Add BeyondTrust as a preferred source on Google
  • Privacy
  • Security
  • Manage Cookies
  • Do Not Sell My Data
  • WEEE Compliance

Copyright © 2003 — 2025 BeyondTrust Corporation. All rights reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust Corporation is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.

Prefers reduced motion setting detected. Animations will now be reduced as a result.
Info icon Announcement: AI agents are already inside your organization. With our AI Security Solution, you can now confidently secure them. Learn more.