Pass the Hash and Other Credential Theft and Reuse: Preventing Lateral Movement and Privilege Escalation