The “Pass-the-Hash” (PtH) attack was originally documented in 1997, but has recently made a resurgence. Find out how PtH attacks work, as well as mitigation strategies recommended by Microsoft and the National Security Agency (NSA).
File Size: 241 KB
Duration: 4 Pages