Detecting Pass-the-Hash
Overview of Pass-the-Hash
Pass-the-Hash Attack Steps:
Detection Opportunities for Pass-the-Hash
Detecting Pass-the-Hash With Splunk
Example 1: Detecting Alternate Credentials Logon
index=main earliest=1690450689 latest=1690451116 source="WinEventLog:Security" EventCode=4624 Logon_Type=9 Logon_Process=seclogo
| table _time, ComputerName, EventCode, user, Network_Account_Domain, Network_Account_Name, Logon_Type, Logon_ProcessExample 2: Detecting Pass-the-Hash with LSASS Access
Explanation of Key Search Components
Last updated