Use Alternate Authentication Material
Adversaries may use alternate authentication material, such as password hashes, Kerberos tickets, and application access tokens, in order to move laterally within an environment and bypass normal system access controls. Authentication processes generally require a valid identity (e.g., username) along with one or more authentication factors (e.g., password, pin, physical smart card, token generator, etc.). Alternate authentication material is legitimately generated by systems after a user or application successfully authenticates by providing a valid identity and the required authentication factor(s). By stealing alternate authentication material, adversaries are able to bypass system access controls and authenticate to systems without knowing the plaintext password or any additional authentication factors. Sub-techniques include Application Access Token abuse (T1550.001), Pass the Hash (T1550.002), Pass the Ticket (T1550.003), and Web Session Cookie reuse (T1550.004).
// T1550 — Use Alternate Authentication Material
// Detects Pass-the-Hash (LogonType 9 and NTLM network logons), Pass-the-Ticket (RC4 Kerberos downgrade),
// and NTLM hash override attempts using Windows Security Event logs
SecurityEvent
| where TimeGenerated > ago(24h)
| where EventID in (4624, 4769, 4776)
// Pass-the-Hash: LogonType 9 (NewCredentials) — definitive mimikatz sekurlsa::pth artifact
| extend PTH_Type9 = iff(
EventID == 4624 and LogonType == 9,
1, 0)
// Pass-the-Hash: NTLM network logon from a remote host (not a machine account)
| extend PTH_NTLM = iff(
EventID == 4624
and LogonType == 3
and AuthenticationPackageName =~ "NTLM"
and TargetUserName !endswith "$"
and IpAddress !in ("-", "::1", "127.0.0.1", ""),
1, 0)
// Pass-the-Ticket: RC4-HMAC encryption (0x17) on Kerberos service ticket — golden/silver ticket indicator
| extend PTT_RC4 = iff(
EventID == 4769
and TicketEncryptionType =~ "0x17"
and Status =~ "0x0",
1, 0)
// Overpass-the-Hash / NTLM relay: NTLM credential validation failures on domain controllers
| extend NTLM_HashFail = iff(
EventID == 4776
and Status !in ("0x0", "", "-"),
1, 0)
| where PTH_Type9 == 1 or PTH_NTLM == 1 or PTT_RC4 == 1 or NTLM_HashFail == 1
| extend AttackPattern = case(
PTH_Type9 == 1, "Pass-the-Hash: LogonType 9 NewCredentials (mimikatz sekurlsa::pth)",
PTH_NTLM == 1, "Pass-the-Hash: NTLM Network Logon from Remote Source",
PTT_RC4 == 1, "Pass-the-Ticket: RC4-HMAC Kerberos Downgrade (Golden/Silver Ticket)",
NTLM_HashFail == 1, "NTLM Hash Override / Credential Validation Failure",
"Alternate Auth Abuse"
)
// Weight LogonType 9 highest — it is the most unambiguous PTH indicator
| extend SuspicionScore = PTH_Type9 * 3 + PTH_NTLM + PTT_RC4 * 2 + NTLM_HashFail
| project TimeGenerated, Computer, EventID, TargetUserName, TargetDomainName,
LogonType, AuthenticationPackageName, IpAddress, WorkstationName,
SubjectUserName, SubjectDomainName, LogonGuid,
AttackPattern, SuspicionScore,
TicketEncryptionType, TicketOptions, Status
| sort by SuspicionScore desc, TimeGenerated desc Data Sources
Required Tables
False Positives
- runas /netonly command legitimately generates LogonType 9 events for users running applications with alternate network credentials — expected on developer and admin workstations
- Legacy applications, NAS appliances, and non-domain-joined devices that cannot negotiate Kerberos will generate NTLM network logons (LogonType 3) — expected in mixed or older environments
- Windows Server 2008 R2 and earlier systems, as well as third-party Kerberos clients (Linux Samba, older Cisco devices), default to RC4-HMAC encryption and will trigger the PTT_RC4 branch without malicious intent
- Service accounts explicitly configured for NTLM in certain application integrations (SQL Server linked servers, legacy web applications) may generate recurring NTLM network logon events from known source IPs
References (13)
- https://attack.mitre.org/techniques/T1550/
- https://technet.microsoft.com/en-us/library/dn487457.aspx
- https://csrc.nist.gov/glossary/term/authentication
- https://csrc.nist.gov/glossary/term/multi_factor_authentication
- https://learn.microsoft.com/en-us/defender-endpoint/advanced-hunting-securityevent-table
- https://github.com/gentilkiwi/mimikatz/wiki/module-~-sekurlsa
- https://github.com/SecureAuthCorp/impacket
- https://www.sans.org/white-papers/36962/
- https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/plan/security-best-practices/credential-protection-and-management
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1550.002/T1550.002.md
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1550.003/T1550.003.md
- https://adsecurity.org/?p=1515
- https://www.microsoft.com/en-us/security/blog/2021/09/27/foggyweb-targeted-nobelium-malware-leads-to-persistent-backdoor/
Unlock Pro Content
Get the full detection package for T1550 including response playbook, investigation guide, and atomic red team tests.