[ mainpage :: register :: training :: conference :: hitb-labs :: the venue ]
[ capture the flag (CTF) :: wireless village :: lock picking village (LPV) :: open-hack ]
[ call for papers (CFP) :: conference agenda :: sponsors :: press/media :: forum ]
[ conference kit (PDF) :: past conferences :: contact us ]


HITBSecConf2008 - Malaysia (Day 1)

HITBSecConf2008 - Malaysia (Day 2)

Registration for HITBSecConf2009 - Dubai is also now open.

Hernan Ochoa (Senior Security Consultant, Core Security Technologies)

Filed under: Main Page — Administrator @ 11:44 am

Presentation Title: Pass-the-Hash Toolkit for Windows
Presentation Abstract:

The ‘Pass-the-hash’ technique, first published in 1997 by Paul Ashton, basically allows attackers to use captured NTLM hashes to authenticate to remote hosts without having to decrypt those hashes to obtain the cleartext password. All these years this technique has been performed using modified smb clients (e.g.: samba) or third-party implementations of the SMB/CIFS protocol. This means that after successfully authenticating to a remote host using the ‘pass-the-hash’ technique, functionality available to attackers/penetration testers is limited to what is implemented by these clients.

The Pass-The-hash toolkit is the first public implementation of the ‘pass-the-hash’ technique for the Windows platform. It allows attackers/penetration testers to perform the technique from a Windows machine (e.g.: by changing the current local logon session credentials or by creating a new local logon session with the desired credentials: username/domain/NTLM hashes) and then, once authenticated, use native Windows administration utilities (made by Microsoft or a third-party) to access remote services, gaining access to all the functionality provided by the native utilities without limitations.

This presentation will describe how the different tools included in the toolkit were implemented, and will explain how to use the toolkit during a penetration test.

About Hernan

Hernan has been working for Core for the last ~9 years and has wrote a full-blown antivirus software mostly used to detect and remove ‘latin-american’ viruses in ‘98. At that time the most important antivirus products did not detect viruses created in south-america or it took them too long to do it. After a couple of years, he began working for CORE at the time the company was just starting out. He participated in the research, design & development of a multi-os security suite for a bank supporting DOS, Novell, Win31, Win95, Win98, WinNT and wrote device drivers, intermediate drivers and programs to hook syscalls.

He was also involved in the creation of the CORE IMPACT product and wrote several modules for it; including modules to inject IMPACT agents on process in runtime, fake smb server to capture credentials, etc. He is currently actively working as a security consultant doing pentests, reverse-engineering, blackbox security audits, webapp pentests, source code audits, etc.

Event Organizer

Hack In The Box (M) Sdn. Bhd.

Supported & Endorsed By

Malaysian National Computer Confederation

Multimedia Development Corporation

Platinum Sponsors

Titanium Sponsor (Post Conference Reception)

Gold Sponsors

CTF Sponsor

CTF Prize Sponsor

Open-Hack Sponsor

Metro-e and Official Bandwidth Sponsor

Network Equipment Sponsor

Our Speakers are Supported By

Supporting Media:

Virus Bulletin

InfoSec News

InfoSec News

XAKEP (Russia)

Supporting Organizations

Professional Information Security Association - Hong Kong

Special Interest Group in Security & Information InteGrity Singapore