The “Pass-the-Hash” (PtH) attack was originally documented in 1997, but these types of attacks have recently made a resurgence. Find out what a “hash” is and how PtH attacks work, as well as mitigation strategies recommended by Microsoft and the National Security Agency (NSA). (PDF | 4 Pages | 241 KB)
Login or signup below to download this informative free resource!