Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

980+ Articles
124+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Why Changing Passwords Doesn't End an Active Directory Breach
Why Changing Passwords Doesn't End an Active Directory Breach
NEWS

Why Changing Passwords Doesn't End an Active Directory Breach

Resetting compromised passwords is a natural first response to a breach, but it's not enough. Cached credentials, Kerberos ticket grants, and persistent attacker footholds mean Active Directory environments can remain compromised long after a password reset.

Dylan H.

News Desk

May 11, 2026
4 min read

When organizations detect a compromised account, the instinct is immediate: reset the password. It's a logical first step, but in Active Directory (AD) environments, it often isn't enough to remove an attacker who has already established persistence. Analysis from Specops Software highlights how cached credentials, Kerberos tickets, and AD-specific attack paths can keep adversaries authenticated and active well after a password change.

The Problem with Password Resets Alone

A password reset invalidates the user's current password hash in Active Directory. What it does not automatically do is:

  • Invalidate existing Kerberos Ticket Granting Tickets (TGTs) already issued to the attacker's session
  • Clear cached credentials on workstations or servers where the account has previously authenticated
  • Revoke NTLM hashes stored in Windows Credential Manager or LSA secrets on remote systems
  • Terminate active RDP or SMB sessions where a token is still valid

This creates a window — sometimes hours, sometimes much longer — where an attacker can continue operating under the old session context even after the password is changed.

Kerberos Ticket Lifetime

Kerberos TGTs have a default lifetime of 10 hours in most Active Directory configurations, with a renewal period of up to 7 days. Once issued, a TGT authenticates the holder to services across the domain without re-querying the domain controller for credentials. An attacker who has obtained a TGT — through Pass-the-Ticket, credential harvesting, or legitimate compromise — can continue using it until it expires, regardless of the underlying password being changed.

What defenders need to do:

  • Force Kerberos ticket invalidation by using klist purge on affected systems or via Group Policy to set shorter ticket lifetimes
  • Enable Kerberos Armoring (FAST) to protect tickets from offline cracking
  • Audit for 4769 (Kerberos Service Ticket Operations) events in the Security log for anomalous ticket requests

Cached Credentials and Pass-the-Hash

Windows systems cache domain credential hashes locally to allow logon when the domain controller is unreachable. These cached hashes — stored in the registry under HKLM\SECURITY\Cache — persist until overwritten. An attacker with local admin access can extract these hashes with tools like Mimikatz and use them in Pass-the-Hash (PtH) attacks against other systems, even after the original password is reset.

NTLM authentication doesn't require the attacker to know the plaintext password — the hash alone is sufficient to authenticate. Until cached credentials are cleared from every affected endpoint, the attacker retains lateral movement capability.

Golden and Silver Tickets

For attackers who achieve Domain Admin access, the threat extends further. A Golden Ticket attack — using the KRBTGT account's hash to forge arbitrary Kerberos tickets — persists until the KRBTGT password is rotated twice (because older domain controllers may still accept tickets signed with the previous hash). A single KRBTGT password reset is insufficient.

Silver Tickets, forged for specific services using a service account's hash, are harder to detect and are not validated against the domain controller at all, making them particularly persistent.

What a Thorough Remediation Looks Like

A genuine Active Directory breach remediation requires more than a password reset. Security teams should:

  1. Identify all systems the compromised account authenticated to using DC Security logs (Event ID 4624, 4625, 4648)
  2. Clear cached credentials from affected endpoints via Group Policy or endpoint management tools
  3. Force Kerberos ticket expiration by temporarily setting the domain maximum ticket lifetime to a very short value
  4. Rotate the KRBTGT password twice if any Domain Admin-level compromise is suspected
  5. Audit service account SPNs for signs of Kerberoasting — service tickets for sensitive accounts should be reviewed
  6. Review privileged group membership (Domain Admins, Enterprise Admins, Schema Admins) for unauthorized additions

Password hygiene matters, but in Active Directory environments, it is only one layer of a multi-step incident response. Organizations that treat a password reset as closure risk leaving attackers with an extended window of opportunity.

#Active Directory#Data Breach#Identity Security#Kerberos#Windows Security

Related Articles

Learning from the Vercel Breach: Shadow AI and OAuth Sprawl

The Vercel breach, traced to a compromised third-party AI tool with OAuth access, illustrates how Shadow AI adoption and unchecked OAuth integrations are...

5 min read

Your Next Breach Will Look Like Business as Usual

Credential-based attacks now dominate the threat landscape, and traditional detection models are failing. Here are the fundamental shifts cybersecurity...

4 min read

Why Simple Breach Monitoring Is No Longer Enough

Infostealers are harvesting credentials and session cookies at scale, quietly bypassing MFA and traditional defenses. Here's why organizations need...

4 min read
Back to all News