Understanding Pass-the-Hash Attacks - and Mitigating the Risks

Understanding Pass-the-Hash Attacks - and Mitigating the Risks

Even though the pass-the-hash (PtH) attack was originally published by Paul Ashton in 1997 and several white papers and tech briefs have been written on the topic, these attacks have recently come to the forefront again.

Read this white paper to:

  • Find out how these attacks work;
  • Learn about the mitigation strategies recommended by Microsoft and the NSA;
  • See how two software solutions can help you implement those mitigations.



Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.