Pass the hash (PtH) is a common method hackers employ to use your systems against you. Most PtH attacks are done via human speed attacks, not through automated malware, using a remote human controller. Using PtH techniques, an entire domain can be compromised in as little as 10 minutes. When all computers have the same local admin password, then all PCs can be compromised. There are preventive measures that can be used to combat PtH attacks. In this paper we focus on how removing admin rights significantly decreases the ability to use local admin credentials in a PtH attack.
Free registration. Login to proceed.
Returning users: Enter your email and password to login.
New users: Enter your email. You will need to complete a short registration form before accessing your resource.