Pass the Hash and Other Credential Theft and Reuse: Preventing Lateral Movement and Privilege Escalation

Download this episode

Download Video


Pass the Hash and other credential theft and reuse has become one of the most popular attacks affecting our customers. In 2012, multiple of our high profile customers made their top priority to address Pass the Hash. In response, Microsoft has assembled a workgroup to investigate effective and practical mitigations that could be used now as well as future platform modifications. This presentation will cover the problem of Pass-the-Hash attacks and discuss Microsoft's recommended mitigations.







Available formats for this video:

Actual format may change based on video formats available and browser capability.

    The Discussion

    Comments closed

    Comments have been closed since this content was published more than 30 days ago, but if you'd like to send us feedback you canĀ Contact Us.