Security | Vulnerability Scans and Assessment What is Pass the Hash Attack and how to mitigate the attack