What is Pass the Hash Attack and how to mitigate the attack

This article discusses “What is Pass the Hash Attack and how to mitigate the attack”. A Pass the Hash (PTH) attack is a technique whereby an attacker captures a password hash as opposed to the password itself (characters) thereby gaining access (authentication) to the networked systems. This technique is used to steal credentials and enable lateral movement within a network. In a … Continue reading What is Pass the Hash Attack and how to mitigate the attack