Thursday, June 13, 2013

Mitigating Pass-the-Hash (PtH) Attacks and Other Credential Theft Techniques

This document discusses Pass-the-Hash (PtH) attacks against Windows operating systems, how the attack is performed, and recommends mitigations for PtH attacks and similar credential theft attacks.

Read more: MS Download
QR: Inline image 1