Skip to content

Commit 1f23f45

Browse files
authored
Create T1550.002-Lateral Movement - Pass the Hash.md
1 parent 11753f5 commit 1f23f45

File tree

1 file changed

+53
-0
lines changed

1 file changed

+53
-0
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,53 @@
1+
Lateral Movement - Pass the Hash
2+
3+
**(P) Preparation**
4+
5+
1. Patch asset vulnerabilities
6+
2. Perform routine inspections of controls/weapons
7+
3. Ensure Antivirus/Endpoint Protection software is installed on workstations
8+
4. Ensure that servers and workstations are logging to a central location
9+
5. Network segmentation and firewalls can help reduce impact
10+
6. Disable NTLM authentication where possible
11+
a. SMB
12+
b. HTTP
13+
c. SMTP
14+
15+
**(I) Identification**
16+
17+
1. Monitor for:
18+
a. Unusual user activity
19+
b. Unexpected logins using NTLM
20+
2. Investigate and clear ALL alerts associated with the impacted assets
21+
22+
**(C) Containment**
23+
24+
1. Inventory (enumerate & assess)
25+
2. Detect | Deny | Disrupt | Degrade | Deceive | Destroy
26+
3. Observe -> Orient -> Decide -> Act
27+
4. Issue perimeter enforcement for known threat actor locations
28+
5. Lock accounts suspected of having a compromised hash
29+
6. Systems believed to have malware on them should be removed from the network
30+
31+
**(E) Eradication**
32+
33+
1. Close the attack vector
34+
2. Patch asset vulnerabilities
35+
3. Perform Endpoint/AV scans on the systems of affected users
36+
4. Review logs to identify other potential cases of passing the hash
37+
38+
**(R) Recovery**
39+
40+
1. Restore to the RPO within the RTO
41+
2. Address collateral damage
42+
3. Change the passwords of any potentially compromised accounts
43+
4. Determine the chain of events that led to the pass the hash incident
44+
5. Resolve any related security incidents
45+
46+
**(L) Lessons/Opportunities**
47+
48+
1. Perform routine cyber hygiene due diligence
49+
2. Engage external cybersecurity-as-a-service providers and response professionals
50+
51+
**References:**
52+
53+
1. MITRE ATT&CK Technique T1550 Sub-technique 002: https://attack.mitre.org/techniques/T1550/002/

0 commit comments

Comments
 (0)