Pass the Hash and Other Credential Theft and Reuse: Preventing Lateral Movement and Privilege Escalation

36 minutes, 40 seconds


Right click “Save as…”

Pass the Hash and other credential theft and reuse has become one of the most popular attacks affecting our customers. In 2012, multiple of our high profile customers made their top priority to address Pass the Hash. In response, Microsoft has assembled a workgroup to investigate effective and practical mitigations that could be used now as well as future platform modifications. This presentation will cover the problem of Pass-the-Hash attacks and discuss Microsoft's recommended mitigations.

Follow the discussion

  • Oops, something didn't work.

    Getting subscription
    Subscribe to this conversation

Comments closed

Comments have been closed since this content was published more than 30 days ago, but if you'd like to continue the conversation, please create a new thread in our Forums, or Contact Us and let us know.