This document discusses Pass-the-Hash (PtH) attacks against Windows operating systems, how the attack is performed, and recommends mitigations for PtH attacks and similar credential theft attacks.
Recent Downloads and Articles from the Microsoft Download Center
This document discusses Pass-the-Hash (PtH) attacks against Windows operating systems, how the attack is performed, and recommends mitigations for PtH attacks and similar credential theft attacks.