TWC: Pass-the-Hash: How Attackers Spread and How to Stop Them
- Date: May 13, 2014 from 1:30PM to 2:45PM
- Day 2
- Grand Ballrm C
- DCIM-B359
- Speakers: Nathan Ide, Mark Russinovich
- 15,832 Views
Right click “Save as…”
Slides (view online)Pass-the-hash transforms the breach of one machine into total compromise of infrastructure. The publication of attacks and lack of tools to respond have forced enterprises to rely on onerous and ineffective techniques. In this session, we deconstruct the PtH threat, show how the attack is performed, and how it can be addressed using new features and functionality recently introduced in Windows.
Comments have been closed since this content was published more than 30 days ago, but if you'd like to continue the conversation,
please create a new thread in our Forums,
or
Contact Us and let us know.
Follow the Discussion
Oops, something didn't work.
What does this mean?
Following an item on Channel 9 allows you to watch for new content and comments that you are interested in. You need to be signed in to Channel 9 to use this feature.What does this mean?
Following an item on Channel 9 allows you to watch for new content and comments that you are interested in and view them all on your notifications page.sign up for email notifications?