Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 790

Pass-the-Hash

What is Pass-the-Hash?

Pass-the-HashA credential-reuse attack that authenticates to Windows systems using a stolen NTLM password hash instead of the cleartext password.


Pass-the-Hash (PtH) exploits the way NTLM authentication treats the password hash as the effective credential: any process holding the hash can authenticate without ever knowing the password. Attackers dump hashes from LSASS memory or the SAM database (commonly with Mimikatz or secretsdump) and then replay them against SMB, WMI, or remote management services to move laterally. MITRE ATT&CK tracks this as T1550.002 under Use Alternate Authentication Material. Defences include enabling Credential Guard, restricting local admin reuse with LAPS, enforcing tiered administration, disabling NTLM where possible, and monitoring LSASS access and anomalous logons.

Examples

  1. 01

    An operator dumps NTLM hashes with Mimikatz and uses them to authenticate to other servers via SMB.

  2. 02

    Reusing a local administrator hash across an estate to pivot from a workstation to a file server.

Frequently asked questions

What is Pass-the-Hash?

A credential-reuse attack that authenticates to Windows systems using a stolen NTLM password hash instead of the cleartext password. It belongs to the Attacks & Threats category of cybersecurity.

What does Pass-the-Hash mean?

A credential-reuse attack that authenticates to Windows systems using a stolen NTLM password hash instead of the cleartext password.

How does Pass-the-Hash work?

Pass-the-Hash (PtH) exploits the way NTLM authentication treats the password hash as the effective credential: any process holding the hash can authenticate without ever knowing the password. Attackers dump hashes from LSASS memory or the SAM database (commonly with Mimikatz or secretsdump) and then replay them against SMB, WMI, or remote management services to move laterally. MITRE ATT&CK tracks this as T1550.002 under Use Alternate Authentication Material. Defences include enabling Credential Guard, restricting local admin reuse with LAPS, enforcing tiered administration, disabling NTLM where possible, and monitoring LSASS access and anomalous logons.

How do you defend against Pass-the-Hash?

Defences for Pass-the-Hash typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Pass-the-Hash?

Common alternative names include: PtH.

Related terms

See also