Pass the Hash and Other Credential Theft and Reuse: Preventing Lateral Movement and Privilege Escalation

Download this episode

Download Video

Description

Pass the Hash (PtH) has become one of the most widespread attacks affecting our customers. Many of our customers have made it their top priority to address PtH. In response, Microsoft has assembled a workgroup to investigate effective and practical mitigations that could be used now as well as future platform modifications. This presentation covers the problem of credential theft and re-use, focusing on Pass-the-Hash attacks as an example, and discusses Microsoft’s recommended mitigations. The presenters are members of the Cybersecurity Services team.

Day:

3

Session Type:

Breakout

Code:

ATC-B210

Room:

Room 265

Embed

Format

Available formats for this video:

Actual format may change based on video formats available and browser capability.

    The Discussion

    • User profile image
      B3NT

      One of the questions from the audience was about smart cards with "dynamic groups"...does anyone know what he is talking about?

    Comments closed

    Comments have been closed since this content was published more than 30 days ago, but if you'd like to send us feedback you can Contact Us.