A credential theft technique that uses captured NTLM password hashes to authenticate as a user - without ever knowing the plaintext password.
Hover over the components of a credential dump entry to inspect each field:
KEY INSIGHT: NTLM authentication never transmits the password - it uses the hash directly in a challenge-response exchange. An attacker with the hash can replay this exchange and authenticate as the victim.
The attacker first gains a foothold on any machine within the target network. This is the prerequisite for all subsequent steps. The method of initial access can vary widely.
To extract hashes from LSASS (Local Security Authority Subsystem Service), the attacker needs SYSTEM or Administrator-level privileges. Several escalation paths exist on Windows.
With SYSTEM privileges, the attacker dumps NTLM hashes from LSASS memory or the SAM/NTDS.dit database. These hashes are the "keys" that will be replayed against other systems.
The hash is injected directly into an authentication session or used with a tool that speaks NTLM. The NTLM protocol's challenge-response mechanism accepts the hash as-is - no password cracking needed.
Using the injected hash, the attacker connects to other machines on the network where the account is valid. Domain admin hashes provide access to every machine in the domain.
The ultimate goal: compromise the Domain Controller and dump NTDS.dit, obtaining hashes for every domain user. The attacker can now impersonate any user in the entire organization.