Even though the pass-the-hash (PtH) attack was originally published by Paul Ashton in 1997 and several white papers and tech briefs have been written on the topic, these attacks have recently come to the forefront again.
Read this white paper to:
- Find out how these attacks work;
- Learn about the mitigation strategies recommended by Microsoft and the NSA;
- See how two software solutions can help you implement those mitigations.