Detecting Pass The Hash Attacks | Skills Pool
Detecting Pass The Hash Attacks Detect Pass-the-Hash attacks by analyzing NTLM authentication patterns, identifying Type 3 logons with NTLM where Kerberos is expected, and correlating with credential dumping.
mukul975 4,535 stars Apr 6, 2026 Occupation Categories Security When to Use
When proactively hunting for indicators of detecting pass the hash attacks in the environment
After threat intelligence indicates active campaigns using these techniques
During incident response to scope compromise related to these techniques
When EDR or SIEM alerts trigger on related indicators
During periodic security assessments and purple team exercises
Prerequisites
EDR platform with process and network telemetry (CrowdStrike, MDE, SentinelOne)
SIEM with relevant log data ingested (Splunk, Elastic, Sentinel)
Sysmon deployed with comprehensive configuration
Windows Security Event Log forwarding enabled
Threat intelligence feeds for IOC correlation
Workflow
Formulate Hypothesis : Define a testable hypothesis based on threat intelligence or ATT&CK gap analysis.
Identify Data Sources : Determine which logs and telemetry are needed to validate or refute the hypothesis.
Quick Install
Detecting Pass The Hash Attacks npx skills add mukul975/Anthropic-Cybersecurity-Skills
stars 4,535
Updated Apr 6, 2026
Occupation
Execute Queries : Run detection queries against SIEM and EDR platforms to collect relevant events.
Analyze Results : Examine query results for anomalies, correlating across multiple data sources.
Validate Findings : Distinguish true positives from false positives through contextual analysis.
Correlate Activity : Link findings to broader attack chains and threat actor TTPs.
Document and Report : Record findings, update detection rules, and recommend response actions.
Key Concepts Concept Description T1550.002 Pass the Hash T1550.003 Pass the Ticket T1078 Valid Accounts
Tool Purpose CrowdStrike Falcon EDR telemetry and threat detection Microsoft Defender for Endpoint Advanced hunting with KQL Splunk Enterprise SIEM log analysis with SPL queries Elastic Security Detection rules and investigation timeline Sysmon Detailed Windows event monitoring Velociraptor Endpoint artifact collection and hunting Sigma Rules Cross-platform detection rule format
Common Scenarios
Scenario 1 : Mimikatz sekurlsa::pth with stolen NTLM hash
Scenario 2 : Impacket psexec.py remote execution with hash
Scenario 3 : CrackMapExec hash spraying across hosts
Scenario 4 : WMI lateral movement via pass-the-hash
Hunt ID: TH-DETECT-[DATE]-[SEQ]
Technique: T1550.002
Host: [Hostname]
User: [Account context]
Evidence: [Log entries, process trees, network data]
Risk Level: [Critical/High/Medium/Low]
Confidence: [High/Medium/Low]
Recommended Action: [Containment, investigation, monitoring]
02
Prerequisites