Sign in

    Mitigating Pass-the-Hash (PtH) Attacks and Other Credential Theft, Version 1 and 2

    Language:
    English
    This document discusses Pass-the-Hash (PtH) attacks against the Windows operating systems and provides holistic planning strategies that, when combined with the Windows security features, will provide a more effective defense against pass-the-hash attacks.
    • Note:There are multiple files available for this download.Once you click on the "Download" button, you will be prompted to select the files you need.
      Version:

      2.0

      File Name:

      Mitigating Pass-the-Hash (PtH) Attacks and Other Credential Theft Techniques_English.pdf

      Mitigating-Pass-the-Hash-Attacks-and-Other-Credential-Theft-Version-2.pdf

      Date Published:

      7/7/2014

      File Size:

      1.2 MB

      1.1 MB

        This document discusses Pass-the-Hash (PtH) attacks against the Windows operating systems and encourages organizations to assume that a breach has already occurred in order to highlight the need for a more mature defense. It provides holistic planning strategies that IT pros should consider implementing when architecting a credential theft defense. These strategies, when combined with the Windows security features, will provide a more effective defense against pass-the-hash attacks.
    • Supported Operating System

      Windows 2000 Server, Windows 7, Windows 8, Windows Server 2003, Windows Server 2008, Windows Server 2012, Windows Vista, Windows XP

        Any supported Operating System
      • Download the PDF.