LSASS Protection
Implementing PPL (Protected Process Light) for LSASS can significantly hinder memory dumping attempts.
Pass-the-Hash is the most common technique targeting the NTLM protocol. Since the protocol does not require the clear-text password but only its hash to prove identity, an attacker who recovers this hash can impersonate the user.
NTLM relies on a challenge-response mechanism. The system only requires the result of a calculation performed with the hash. By providing the hash directly, the attacker circumvents the need for the original password.
In modern environments where Kerberos is the preferred protocol, attackers use Pass-the-Ticket. Instead of a hash, they steal a Kerberos Ticket (TGT or Service Ticket).
Kerberos tickets are the ultimate proof of identity. If an attacker possesses a valid ticket belonging to another user, the system treats them as that user for the duration of the ticket’s validity.
Detection of PtT is notoriously difficult because the resulting Kerberos traffic appears perfectly legitimate. Analysts must focus on:
Understanding the “Patient Zero” is critical. The first compromised machine is where the “keys to the kingdom” were stolen.
| Event ID | Description | Forensic Importance |
|---|---|---|
| 4624 | Successful Logon | Look for Logon Type 3 (Network) using NTLM on the target server. |
| 4672 | Special Privileges Assigned | Indicates that the session was opened with administrative rights. |
| 4768 / 4769 | Kerberos TGT/Service Ticket | Essential for tracking the flow of tickets in the domain. |
LSASS Protection
Implementing PPL (Protected Process Light) for LSASS can significantly hinder memory dumping attempts.
Tiered Admin Model
Separating administrative accounts from standard workstations limits the exposure of high-privilege hashes.