Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Wednesday, 7 June, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Please don't pass the hash

by The Gurus
October 21, 2014
in Opinions & Analysis
Share on FacebookShare on Twitter

Currently, there’s a lot of talk about “pass-the-hash” (PtH) attacks.
 
PtH attacks are based on exploiting vulnerabilities in the Windows Lan Manager (LM) and Windows NT Lan Manager (NTLM) authentication systems. Therefore, any Windows system is vulnerable to PtH attacks, which are very difficult to defend against because it only takes one misconfigured computer, or a computer missing a single security patch in a Windows domain, for an attacker to find a way in.
 
Unfortunately there are countless exploits in Windows, and applications running on Windows, that an attacker can use to elevate their privileges and carry out the hash harvesting which facilitates the attack.
 
Equally unfortunate is the fact that there is no single PtH patch, software, hardware or magic wand that will protect a network against the attacks and vulnerabilities. To use a metaphor, you need the multiple defences of a moat: high, thick walls; lookouts; spies and good soldiers.
 
In technology terms, we call this defence in depth, or multiple layers of security. Using firewalls, intrusion prevention systems, 802.1x and smartcard or two-factor authentication, IPsec, anti-virus software, full-disk encryption, reducing the number of people with elevated privileges and pro-active security patching can be used to deter, detect and eliminate intruders and help to protect the corporate network from these attacks.
 
However, it is impossible to fully protect a network from this or any other type of attack. Therefore, if organisations want 100 per cent protection, the best thing to do is disconnect from the internet and not allow employees to take their laptops out of the office!
 
There are a number of basic things that can be done to better protect a network and there also are software solutions that can help. In addition, Microsoft has published a number of documents about pass-the-hash that are worthwhile reading, including: Pass-the-Hash and Other Credential Theft and New Strategies and Features to Help Organizations Better Protect Against Pass-the-Hash Attacks.
 
A few of the most basic things you can do to protect your network are:

  1. Never include your normal work account in a privileged group. If you need to do something that requires elevated domain privileges, log off and then log on to your administrative account. This keeps your work and privileged duties segregated so if you are subjected to phishing or some other compromise, it’s more likely to happen on your non-privileged work account.
  2. Use a different, more secure machine for privileged domain operations. Make sure it is running the latest OS with all appropriate patches, apply stricter and stronger security policies to it and connect it to your network via an ethernet cable, as opposed to using WiFi.
  3. Always use a password of 15 characters or greater for your privileged accounts. The LMHash is weaker compared to other hashes, therefore, by using a 15-character or longer password, you prevent the storing of the LMHash. It is also good practice to have a longer password for a privileged
    account. Change it frequently and make sure you’ve implemented the Windows “NoLMHash” Group Policy. For more information, visit: http://support.microsoft.com/kb/299656
  4. Email is another method frequently used by attackers. It is therefore essential to ensure your administrative accounts do not have Exchange or email access and you can further strengthen the account.
  5. Ensure that your local guest and administrator accounts are disabled.
  6. Finally, use a software solution that helps protect sensitive administrative credentials, including those for Windows. It is important to choose a solution that automates, controls and secures the entire process of granting administrators the credentials necessary to perform their duties and has the capability to disable privileged accounts when they are not in use by an authorized individual.

 
Like most things related to security, there’s a trade-off between convenience and peace of mind. The Microsoft website has a multitude of information on protecting yourself from pass-the-hash attacks.
 
 
Jackson Shaw is senior director of product management for identity and access management at Dell Software 

FacebookTweetLinkedIn
ShareTweet
Previous Post

Black Hat EU 2014

Next Post

BAE Systems to acquire SilverSky to add managed services to offering

Recent News

large open office, bright.

Employees Feel 10 Times Calmer in an Environmentally Friendly Office Space

June 7, 2023
Blue Logo OUTPOST24

Outpost24 Acquires EASM Provider Sweepatic

June 7, 2023
Standard post, logos of brands, headshot.

J Brand: The Challenges of Putting Mental Health First in an Unfamiliar Industry

June 6, 2023
iPad with Anxiety written on it in capitals.

Half of UK Employees Suffer From “Sunday Scaries”

June 6, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information