Mitigating Pass-the-Hash (PtH) Attacks and Other Credential Theft Techniques

This document discusses Pass-the-Hash (PtH) attacks against Windows operating systems, how the attack is performed, and recommends mitigations for PtH attacks and similar credential theft attacks.