AI agents: see /llms.txt for a full index of this site, or /llms-full.txt for concatenated documentation.

Back
Credential ProtectionMultipleUpdated Dec 8, 2025

Block Password Hash Dumping

Prevent dscl from dumping macOS user password hashes for offline cracking. Workshop combines file access and CEL rules to lock down shadow data.

Idea

An attacker with root access can use dscl to read encrypted password hashes and salts from /var/db/dslocal/nodes/Default/users/. While not the actual password, an attacker could attempt to crack it. With Santa's file access rules, you can make sure nothing gets to these "crown jewel" files (even as root!) except for built-in macOS services. You can also use a CEL rule to prevent the dscl command from dumping the hash.

Solutions

File AccessProtect Shadow Hash Files
Restrict access to user password hash files
Path Prefixes
Options
Allow Read Access:
Audit Only:
Rule Type:
Processes
  • Signing ID:
  • Signing ID:
Custom Message
ExecutionBlock dscl Hash Dumping
Prevent dscl from reading ShadowHashData
Identifier
Rule Type
Policy
CEL Expression
Custom Message

Mitre Attack

Tags

password-hashdsclcredentials

Deployment Notes

Both rules can be deployed together for defense in depth. The FAA rule protects the files themselves, while the CEL rule prevents the dscl command from being used to read them.

Resources