Blog | G5 Cyber Security

Understanding Pass-the-Hash Attacks – and Mitigating the Risks

The pass-the-hash (PtH) attack was originally published by Paul Ashton in 1997 and several white papers and tech briefs have been written on the topic. Find out how these attacks work and learn about the mitigation strategies recommended by Microsoft and the NSA. See how two software solutions can help you implement those mitigations. Use this white paper to learn more about the attacks and how to use the mitigation options available to protect your data from future attacks. Use the white paper as a guide to how to implement these mitigments.”]

Source: https://www.bankinfosecurity.com/whitepapers/understanding-pass-the-hash-pth-attacks-mitigating-risk-w-1183

Exit mobile version