A Leader in the 2025 Gartner® Magic Quadrant™ for Endpoint Protection Platforms. Five years running.A Leader in the Gartner® Magic Quadrant™Read the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI Security Portfolio
      Leading the Way in AI-Powered Security Solutions
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly ingest data from on-prem, cloud or hybrid environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Identity Security
    • Singularity Identity
      Identity Threat Detection and Response
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-class Expertise and Threat Intelligence.
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      Digital Forensics, IRR & Breach Readiness
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive solutions for seamless security operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • Partner Locator
      Your go-to source for our top partners in your region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
Background image for What are Pass-the-Hash (PtH) & Pass-the-Ticket (PtT)?
Cybersecurity 101/Threat Intelligence/Pass-the-Hash (PtH) and Pass-the-Ticket (PtT)

What are Pass-the-Hash (PtH) & Pass-the-Ticket (PtT)?

Pass-the-Hash and Pass-the-Ticket attacks exploit authentication protocols. Learn how to defend against these sophisticated techniques.

CS-101_Threat_Intel.svg
Table of Contents

Related Articles

  • What Is Predictive Threat Intelligence? How AI Helps Anticipate Cyber Threats
  • Cyber Threat Intelligence Lifecycle
  • What Is Behavioral Threat Detection & How Has AI Improved It?
  • What is Fileless Malware? How to Detect and Prevent Them?
Author: SentinelOne
Updated: July 16, 2025

Pass-the-Hash (PTH) and Pass-the-Ticket (PTT) attacks are techniques used to exploit authentication protocols. This guide explores how these attacks work, their implications for security, and strategies for prevention.

Learn about the importance of securing credentials and monitoring for suspicious activity. Understanding PTH and PTT attacks is essential for organizations to protect their systems.

Organizations must implement strong access controls, employ advanced threat detection and monitoring tools, and regularly update security protocols to thwart these covert tactics. By doing so, they can better defend against the persistent and evolving threats posed by PtH and PtT, safeguarding their sensitive data and network integrity.

Pass-the-Hash (PtH) & Pass-the-Ticket (PtT) - Featured Image | SentinelOne

The Difference Between Pass-the-Hash (PtH) & Pass-the-Ticket (PtT)

PtH and PtT are both malicious techniques used in cybersecurity, but they differ in their focus and execution while sharing common characteristics. Both PtH and PtT are used in:

  • Authentication Attacks – Both PtH and PtT are authentication-based attacks, targeting the mechanisms used to verify the identity of users or systems in a network.
  • Lateral Movement – Both attacks enable lateral movement within a network. Once initial access is gained, attackers use stolen credentials (hashes or tickets) to move laterally and access other systems or resources.
  • Detection Evasion – PtH and PtT attacks are stealthy in nature because they often avoid the need to obtain plaintext passwords, making them harder to detect.

PtH and PtT differ in the following key ways:

  • Targets – PtH primarily focuses on stealing hashed passwords from compromised systems, while PtT focuses on the theft and misuse of authentication tickets within Windows domain environments.
  • Credentials – In PtH, attackers use stolen password hashes for authentication, while in PtT, they abuse Kerberos tickets generated for user or service authentication.
  • Scope – PtH attacks are broader in scope, as they can target various platforms and systems beyond Windows domains. PtT attacks are more specific to Windows domain environments.

Both PtH and PtT are dangerous tactics for lateral movement and privilege escalation in cyberattacks. While they share the common goal of compromising authentication, PtH involves stealing password hashes, whereas PtT focuses on abusing authentication tickets within Windows domains. Understanding the differences and similarities between these techniques is essential for effective cybersecurity defenses and incident response.

A Brief Overview of Pass-the-Hash (PtH) & Pass-the-Ticket (PtT)

PtH and PtT attacks first garnered attention as early as the 1990s when cybercriminals and security researchers began to recognize the inherent weaknesses in the way Windows operating systems handle authentication credentials. PtH emerged as a technique to extract hashed password data from compromised systems. Attackers could then reuse these hashed values to authenticate themselves on other systems, effectively bypassing the need for plaintext passwords.

PtT, on the other hand, primarily targets Windows environments that use the Kerberos authentication protocol. It involves the theft and misuse of authentication tickets, which are generated during user or service authentication. Attackers exploit flaws in the Kerberos ticketing system, enabling them to impersonate legitimate users or services and gain unauthorized access to systems and resources.

In today’s cybersecurity landscape, PtH and PtT attacks remain potent threats. Attackers have refined these techniques and incorporated them into advanced persistent threat (APT) campaigns and ransomware attacks, often exploiting vulnerabilities in network security or using social engineering tactics to gain initial access. Once inside a network, they use PtH and PtT attacks for lateral movement, privilege escalation, and data exfiltration.

The significance of PtH and PtT attacks is underscored by their ability to bypass traditional security measures and evade detection by leveraging hashed credentials and authentication tickets. Defending against these attacks requires a multi-pronged approach, including strong password policies, regular security updates, robust access controls, and advanced threat detection systems.

Understanding How Pass-the-Hash (PtH) & Pass-the-Ticket (PtT) Work

PtH and PtT are sophisticated and malicious tactics employed in cybersecurity, specifically within Windows environments, that facilitate unauthorized access and privilege escalation. These techniques were originally developed as covert methods to compromise Windows authentication systems and have since evolved into persistent threats in the cybersecurity landscape.

PtH and PtT attacks are techniques used by attackers to gain unauthorized access to systems and resources within a network. NTLM (NT LAN Manager) is often a target in these attacks due to its inherent vulnerabilities. Here’s a detailed technical explanation of how these techniques work:

Pass-the-Hash (PtH)

  • Initial Credential Theft – PtH attacks typically begin with the attacker gaining initial access to a Windows system, often through methods like phishing, malware infection, or exploiting software vulnerabilities. Once inside the system, the attacker’s goal is to steal hashed password data stored locally on the system. Windows stores hashed representations of passwords in memory to facilitate authentication without revealing the plaintext password.
  • Hash Capture – Attackers use various tools and techniques to extract the hashed password data from the system’s memory. One commonly used tool is Mimikatz, which can retrieve credentials from Windows systems.
  • Hash Usage – With the captured password hash, the attacker doesn’t need to know the actual plaintext password. Instead, they use this hash directly in authentication attempts.
  • The attacker sends the stolen hash to a target system they want to access, pretending to be a legitimate user. The target system then hashes the password provided by the attacker and compares it to the stored hash for authentication.
  • Access Gained – If the hashes match, the attacker gains unauthorized access to the target system or resource, effectively bypassing the need for the victim’s plaintext password.
  • Attackers often use this access to move laterally within the network, escalate privileges, and access sensitive data.

Pass-the-Ticket (PtT)

  • Kerberos Authentication – PtT attacks primarily target Windows environments that use the Kerberos authentication protocol. Kerberos is commonly used in Active Directory (AD) environments for single sign-on and secure authentication.
  • Initial Ticket Creation – When a user logs into a Windows system, the Kerberos authentication process generates a Ticket Granting Ticket (TGT) for the user, encrypted with a long-term secret (typically the user’s password hash) known only to the user and the Key Distribution Center (KDC).
  • Ticket Extraction – In a PtT attack, the attacker aims to capture this TGT from the memory of a compromised system where they have gained initial access.
  • The attacker uses tools like Mimikatz to extract TGTs from memory.
  • Ticket Usage – With the stolen TGT in hand, the attacker can impersonate the legitimate user associated with the TGT. The attacker presents the TGT to the KDC when requesting service tickets for specific resources.
  • Service Ticket Request – The KDC, which trusts the TGT, issues service tickets for the resources the attacker requests. These service tickets are encrypted with a session key derived from the TGT.
  • Access to Resources – Armed with valid service tickets, the attacker can access network resources and systems as if they were the legitimate user. This allows them to move laterally within the network and potentially compromise additional systems.

Both PtH and PtT attacks are particularly concerning because they allow attackers to operate without knowing the victim’s plaintext password. Mitigating these attacks requires a multi-pronged approach, including strong password policies, regular security updates, robust access controls, and advanced threat detection systems. Additionally, organizations should monitor for signs of credential theft and unusual authentication activities to detect and respond to PtH and PtT attacks promptly.

To secure against the risks associated with PtH and PtT attacks, businesses are implementing several measures:

  • Strong Authentication – Employing multi-factor authentication (MFA) and two-factor authentication (2FA) adds an extra layer of security beyond passwords.
  • Least Privilege Access – Restricting users’ access rights and privileges helps limit the damage that can be caused by compromised credentials.
  • Privileged Access Management (PAM) – PAM solutions help manage, monitor, and secure privileged accounts and access.
  • Network Segmentation – Isolating critical systems from less critical ones can limit lateral movement within a network.
  • Regular Credential Rotation – Implementing policies that require password changes at regular intervals helps reduce the window of opportunity for PtH and PtT attacks.
  • Security Awareness Training – Educating employees about the risks of PtH and PtT attacks and the importance of strong password hygiene is essential.
  • Intrusion Detection Systems – Employing advanced intrusion detection systems can help detect and block PtH and PtT attempts.

Conclusion

Pass-the-Hash (PtH) and Pass-the-Ticket (PtT) attacks stand as persistent threats in the current digital realm. These techniques, often targeting authentication protocols like NTLM and Kerberos, highlight the evolving nature of cyberattacks and the need for perpetual vigilance.

PtH and PtT exploit vulnerabilities in authentication mechanisms, allowing attackers to clandestinely infiltrate networks, move laterally, escalate privileges, and gain unauthorized access to sensitive systems and data. The consequences can be very serious, ranging from data breaches and financial losses to reputational damage.

PtH and PtT attacks serve as stark reminders that the cybersecurity landscape is a changing battleground. To protect against these threats, individuals and organizations must remain vigilant, embrace proactive security measures, and collaborate with cybersecurity experts. Staying ahead of PtH and PtT attacks is not just important; it is the key to safeguarding the digital world in the face of relentless adversaries.

Enhance Your Threat Intelligence

See how the SentinelOne threat-hunting service WatchTower can surface greater insights and help you outpace attacks.

Learn More

Pass The Hash Vs Pass The Ticket FAQs

A pass-the-hash attack is when an attacker steals hashed user credentials and uses them to authenticate without needing the actual password. They extract password hashes from system memory using tools like Mimikatz and reuse them on other systems. This attack exploits Windows authentication protocols like NTLM and works because the hash remains static until the password changes.

A pass-the-ticket attack involves stealing Kerberos tickets, specifically Ticket Granting Tickets (TGT) or service tickets, to impersonate legitimate users. Attackers extract these tickets from memory and inject them into their own sessions to access network resources. It bypasses normal authentication and allows lateral movement without requiring passwords.

Pass-the-hash attacks steal and reuse NTLM password hashes, while pass-the-ticket attacks steal and reuse Kerberos tickets. PtH requires capturing hashed credentials from compromised systems, but PtT uses valid session tickets instead.

PtT attacks are more stealthy since they leverage legitimate Kerberos tickets rather than credential hashes.

Both attacks start with initial system compromise through phishing or malware. Attackers then use tools like Mimikatz to extract hashes or tickets from memory. They pass these stolen credentials to other systems for authentication, allowing lateral movement across networks. The attacks exploit cached credentials in Windows SSO environments.

Organizations using Windows NTLM authentication are most vulnerable, especially those with SSO implementations. Systems without multi-factor authentication or privileged access management face higher risks. Any Windows environment storing hashed credentials in memory can be targeted. Remote workers and systems with administrative privileges are prime targets.

Scan Windows event logs for unusual Kerberos authentication patterns and multiple users from single IP addresses. Use security tools to detect abnormal ticket usage and implement network segmentation.

Deploy endpoint detection platforms like SentinelOne and monitor for tools like Mimikatz. Enable comprehensive logging of authentication events and implement behavioral analytics.

Monitor Windows security event logs for logon type 3 with unusual authentication patterns. Look for successful authentications without corresponding password changes or unexpected network logons. Use SIEM solutions to correlate authentication events and detect lateral movement. You should also use honey tokens and deception techniques to catch attackers who are using stolen credentials.

Discover More About Threat Intelligence

What is an Advanced Persistent Threat (APT)?Threat Intelligence

What is an Advanced Persistent Threat (APT)?

Advanced Persistent Threats (APTs) pose long-term risks. Understand the tactics used by APTs and how to defend against them effectively.

Read More
What is Spear Phishing? Types & ExamplesThreat Intelligence

What is Spear Phishing? Types & Examples

Spear phishing is a targeted form of phishing. Learn how to recognize and defend against these personalized attacks on your organization.

Read More
What is Cyber Threat Intelligence?Threat Intelligence

What is Cyber Threat Intelligence?

Cyber threat intelligence (CTI) helps organizations predict, understand, and defend against cyber threats, enabling proactive protection and reducing the impact of attacks. Learn how CTI enhances cybersecurity.

Read More
What is a Botnet in Cybersecurity?Threat Intelligence

What is a Botnet in Cybersecurity?

Botnets are networks of compromised devices used for malicious purposes. Learn how they operate and explore strategies to defend against them.

Read More
Ready to Revolutionize Your Security Operations?

Ready to Revolutionize Your Security Operations?

Discover how SentinelOne AI SIEM can transform your SOC into an autonomous powerhouse. Contact us today for a personalized demo and see the future of security in action.

Request a Demo
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • English
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2025 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use