Nytro Posted January 16, 2015 Report Posted January 16, 2015 Reducing the Effectiveness of Pass-the-HashNational Security Agency/Central Security ServiceInformation Assurance DirectorateContents1 Introduction .......................................................................................................................................... 12 Background ........................................................................................................................................... 13 Mitigations ............................................................................................................................................ 23.1 Creating unique local account passwords .................................................................................... 33.2 Denying local accounts from network logons ............................................................................... 43.3 Restricting lateral movement on the network with firewall rules ................................................ 54 Windows 8.1 Features .......................................................................................................................... 54.1 Deny local accounts from network logons in Windows 8.1 .......................................................... 54.2 New Remote Desktop feature in Windows 8.1 ............................................................................ 54.3 Protecting LSASS ........................................................................................................................... 64.4 Clearing credentials....................................................................................................................... 64.5 Protected Users group .................................................................................................................. 65 Conclusion ............................................................................................................................................. 76 References ............................................................................................................................................ 7Appendix A: Creating unique local passwords .............................................................................................. 7Appendix B: Denying local administrators network access .......................................................................... 8Appendix C: Configuring Windows Firewall rules ......................................................................................... 9Appendix D: Looking for possible PtH activity by examining Windows Event Logs ................................... 12Appendix E: Summary of Local Accounts .................................................................................................... 12Appendix F: Windows smartcard credentials ............................................................................................. 12Download: https://www.nsa.gov/ia/_files/app/Reducing_the_Effectiveness_of_Pass-the-Hash.pdf Quote