次の方法で共有


Mitigating Pass the Hash Attacks

In the recent months, we have seen more and more targeted attacks towards our customers. A lot of them use a technique called Pass the Hash. This made us publishing a paper, which explains Pass the Hash but much more important shows some fairly simple to implement mitigations against this type of attack. As they are fairly prevalent currently, I would urge you reading through the paper and implement the mitigations:

Mitigating Pass-the-Hash (PtH) Attacks and Other Credential Theft Techniques.

Roger