T1110.002
Password Cracking
Adversaries may use password cracking to attempt to recover usable credentials, such as plaintext passwords, when credential material such as password hashes are obtained. OS Credential Dumping can be used to obtain password hashes, which may then be cracked offline on adversary-controlled systems. Techniques include dictionary attacks, brute force, and rainbow table lookups. Tools like Hashcat, John the Ripper, and Hydra are commonly used. Groups such as APT3, FIN6, Dragonfly, and Salt Typhoon have all leveraged password cracking in their operations.
Microsoft Sentinel / Defender
kusto
let PasswordCrackingTools = dynamic([
"hashcat", "john", "john.exe", "johntheripper",
"hydra", "hydra.exe", "thc-hydra",
"crackmapexec", "cme", "cme.exe",
"ophcrack", "ophcrack.exe",
"l0phtcrack", "lc5", "lc6",
"pwdump", "fgdump",
"mimikatz", "mimitatz", "mimikaz",
"ntdsutil", "secretsdump",
"hashcracker", "winhex"
]);
let CrackingArgPatterns = dynamic([
"--attack-mode", "-a 0", "-a 3", "-a 6", "-a 7",
"--hash-type", "-m 1000", "-m 5600", "-m 13100",
"--wordlist", "-w rockyou", "--rules",
"--show", "--format=NT", "--format=LM",
"rockyou.txt", "passwords.txt", "wordlist",
"-hash-file", "ntlm", "--pot-file"
]);
DeviceProcessEvents
| where Timestamp > ago(24h)
| where (FileName has_any (PasswordCrackingTools))
or (ProcessCommandLine has_any (CrackingArgPatterns))
or (ProcessCommandLine has_any ("hashcat", "john ", "-m 1000", "-m 5600", "rockyou", "ntlm", "--attack-mode", "--hash-type"))
| extend IsKnownCrackingTool = FileName has_any (PasswordCrackingTools)
| extend HasCrackingArgs = ProcessCommandLine has_any (CrackingArgPatterns)
| extend NTLMCracking = ProcessCommandLine has_any ("-m 1000", "-m 5600", "-m 13100", "--format=NT", "--format=LM")
| extend WordlistUsed = ProcessCommandLine has_any ("rockyou", "wordlist", "--wordlist", "-w ")
| extend HasHashFile = ProcessCommandLine has_any ("hashes.txt", "hash.txt", "ntds.dit", ".hash", "dumped")
| project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine,
InitiatingProcessFileName, InitiatingProcessCommandLine, FolderPath,
IsKnownCrackingTool, HasCrackingArgs, NTLMCracking, WordlistUsed, HasHashFile
| sort by Timestamp desc high severity
medium confidence
Data Sources
Process: Process Creation Command: Command Execution Microsoft Defender for Endpoint
Required Tables
DeviceProcessEvents
False Positives
- Security researchers and penetration testers legitimately running Hashcat or John the Ripper on authorized systems
- IT administrators using CrackMapExec for authorized network auditing or password policy testing
- Red team exercises where password cracking tools are deployed on authorized test systems
- Cybersecurity training labs where students practice with password cracking tools in controlled environments
- Password policy compliance tools that check password strength by attempting dictionary attacks
Last updated: 2026-04-17 Research depth: deep
References (10)
- https://attack.mitre.org/techniques/T1110/002/
- https://www.us-cert.gov/ncas/alerts/TA18-106A
- https://en.wikipedia.org/wiki/Password_cracking
- https://hashcat.net/wiki/doku.php?id=hashcat
- https://www.openwall.com/john/
- https://github.com/byt3bl33d3r/CrackMapExec
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1110.002/T1110.002.md
- https://www.fireeye.com/blog/threat-research/2016/04/fin6-cybercrime-gang.html
- https://www.cisa.gov/news-events/cybersecurity-advisories/aa18-074a
- https://github.com/SigmaHQ/sigma/tree/master/rules/windows/process_creation
Unlock Pro Content
Get the full detection package for T1110.002 including response playbook, investigation guide, and atomic red team tests.
Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance