Overview of Credential Reuse Techniques
Impacket supports several credential reuse techniques:- Pass-the-Hash (PtH): Authenticate with NTLM hashes
- Pass-the-Key (PtK): Authenticate with Kerberos AES keys
- Pass-the-Ticket (PtT): Authenticate with Kerberos tickets
- Overpass-the-Hash: Use NTLM hash to request Kerberos tickets
These techniques work because Windows doesn’t require the plaintext password for authentication - only the derived credential material (hash, key, or ticket).
Pass-the-Hash (NTLM)
Authenticate using LM and NT hashes instead of passwords.Basic Pass-the-Hash
Pass-the-Hash with psexec.py
Pass-the-Hash with wmiexec.py
Pass-the-Hash with smbexec.py
Other Tools Supporting Pass-the-Hash
Obtaining NTLM Hashes
From secretsdump.py
From Local SAM
From NTDS.dit (Domain Database)
Computing Hash from Password
Pass-the-Key (Kerberos AES)
Use AES keys instead of NTLM hashes for Kerberos authentication.Obtaining AES Keys
Using AES Keys
Programmatic AES Key Usage
AES Key Advantages:
- More secure than RC4 (NTLM hash)
- Preferred by modern Windows systems
- Less likely to trigger security alerts
- Required for some advanced attacks
Pass-the-Ticket (Kerberos)
Reuse existing Kerberos tickets without needing passwords or hashes.Export Tickets from Windows
Convert Ticket Formats
Use Tickets with Impacket
Programmatic Ticket Usage
Overpass-the-Hash
Use NTLM hash to obtain Kerberos TGT, then use for Kerberos authentication.Basic Overpass-the-Hash
Why Use Overpass-the-Hash?
Benefits:
- Bypass NTLM restrictions (if only Kerberos is allowed)
- More stealthy than direct NTLM authentication
- Access systems that require Kerberos
- Enable Kerberos delegation features
Advanced Credential Techniques
Pass-the-Ticket with S4U2Self
Impersonate users with constrained delegation:Golden Ticket (Domain Dominance)
Silver Ticket (Service-Specific)
Practical Attack Workflows
Workflow 1: Complete Pass-the-Hash Chain
Workflow 2: Hash to Ticket to Access
Workflow 3: Delegation Abuse
Complete Example Scripts
Example 1: Multi-Method Authenticator
Example 2: Hash Extractor and Reuser
Detection and Defense
Defensive Measures
Command Reference
Common Impacket Commands with Credentials
See Also
NTLM Authentication
Deep dive into NTLM hashes and protocol
Kerberos Auth
Understanding Kerberos tickets and delegation