.NET Information center
General information about .NET, Silverlight, WPF, WCF and everything else
Thursday, June 13, 2013
Mitigating Pass-the-Hash (PtH) Attacks and Other Credential Theft Techniques
This document discusses Pass-the-Hash (PtH) attacks against Windows operating systems, how the attack is performed, and recommends mitigations for PtH attacks and similar credential theft attacks.
Share to Twitter
Share to Facebook
Share to Pinterest