What is Pass Password/Hash Attacks ?
If we crack a password and/or can dump the SAM hashes, we can leverage both for lateral movements in the network and that is by passing the password/hash to other accounts in the network and check if the user have a successful login in (local admin) anywhere else.
Using CrackMapExec to execute the attack
Pass the Password Attack
Pass the Hash Attack
What is LSASS?
LSASS stands for Local Security Authority Subsystem Service, LSASS is responsible for enforcing the security policy on the system but it does store credentials of the machine.
LSA secrets are different than LSASS. For example, you can find cleartext passwords, service account passwords, and more in LSA. LSASS is a sub-system of LSA and stores things such as NTLM hashes for domain users, and Kerberos keys/tickets.
-lsa
dumps the LSA secrets and lsassy dumps LSASS. You can also dump LSASS via procdump, task manager, comsvcs, and a few other tooling. - Gray, on TCM Discord server
The database of CME
Access the database of CrackMapExec
by using:
Pass Attacks mitigations
Important considerations
SMB Relay and NTLMv2
Only NTLMv2 can be relayed (SMB Relay Attack).
Pass Hash Attack and NTLMv1
Pass Hash Attack only works with NTLMv1