Let's say the attacker got the username and the hashed password. How can he use it when authenticating to some service in its domain with for example NTLM?
How can he send the request as the compromised user? What tools and techniques should he use?
Let's say the attacker got the username and the hashed password. How can he use it when authenticating to some service in its domain with for example NTLM?
How can he send the request as the compromised user? What tools and techniques should he use?
In a pass the hash scenario there is no salt mixed in with the password when a user authenticates, because of this an attacker can get the hash of the users password when they authenticate to a service and then pass it along to authenticate to more services that use the same authentication scheme without knowing the password. NTLM is an example of a authentication scheme that is vulnerable to this.