T1110.002

Password Cracking

Adversaries may use password cracking to attempt to recover usable credentials, such as plaintext passwords, when credential material such as password hashes are obtained. OS Credential Dumping can be used to obtain password hashes, which may then be cracked offline on adversary-controlled systems. Techniques include dictionary attacks, brute force, and rainbow table lookups. Tools like Hashcat, John the Ripper, and Hydra are commonly used. Groups such as APT3, FIN6, Dragonfly, and Salt Typhoon have all leveraged password cracking in their operations.

Microsoft Sentinel / Defender
kusto
let PasswordCrackingTools = dynamic([
  "hashcat", "john", "john.exe", "johntheripper",
  "hydra", "hydra.exe", "thc-hydra",
  "crackmapexec", "cme", "cme.exe",
  "ophcrack", "ophcrack.exe",
  "l0phtcrack", "lc5", "lc6",
  "pwdump", "fgdump",
  "mimikatz", "mimitatz", "mimikaz",
  "ntdsutil", "secretsdump",
  "hashcracker", "winhex"
]);
let CrackingArgPatterns = dynamic([
  "--attack-mode", "-a 0", "-a 3", "-a 6", "-a 7",
  "--hash-type", "-m 1000", "-m 5600", "-m 13100",
  "--wordlist", "-w rockyou", "--rules",
  "--show", "--format=NT", "--format=LM",
  "rockyou.txt", "passwords.txt", "wordlist",
  "-hash-file", "ntlm", "--pot-file"
]);
DeviceProcessEvents
| where Timestamp > ago(24h)
| where (FileName has_any (PasswordCrackingTools))
   or (ProcessCommandLine has_any (CrackingArgPatterns))
   or (ProcessCommandLine has_any ("hashcat", "john ", "-m 1000", "-m 5600", "rockyou", "ntlm", "--attack-mode", "--hash-type"))
| extend IsKnownCrackingTool = FileName has_any (PasswordCrackingTools)
| extend HasCrackingArgs = ProcessCommandLine has_any (CrackingArgPatterns)
| extend NTLMCracking = ProcessCommandLine has_any ("-m 1000", "-m 5600", "-m 13100", "--format=NT", "--format=LM")
| extend WordlistUsed = ProcessCommandLine has_any ("rockyou", "wordlist", "--wordlist", "-w ")
| extend HasHashFile = ProcessCommandLine has_any ("hashes.txt", "hash.txt", "ntds.dit", ".hash", "dumped")
| project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine,
          InitiatingProcessFileName, InitiatingProcessCommandLine, FolderPath,
          IsKnownCrackingTool, HasCrackingArgs, NTLMCracking, WordlistUsed, HasHashFile
| sort by Timestamp desc
high severity medium confidence

Data Sources

Process: Process Creation Command: Command Execution Microsoft Defender for Endpoint

Required Tables

DeviceProcessEvents

False Positives

  • Security researchers and penetration testers legitimately running Hashcat or John the Ripper on authorized systems
  • IT administrators using CrackMapExec for authorized network auditing or password policy testing
  • Red team exercises where password cracking tools are deployed on authorized test systems
  • Cybersecurity training labs where students practice with password cracking tools in controlled environments
  • Password policy compliance tools that check password strength by attempting dictionary attacks

Unlock Pro Content

Get the full detection package for T1110.002 including response playbook, investigation guide, and atomic red team tests.

Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance

Related Detections