Pass the Hash and Other Credential Theft and Reuse: Preventing Lateral Movement and Privilege Escalation

Play Pass the Hash and Other Credential Theft and Reuse: Preventing Lateral Movement and Privilege Escalation

Description

Pass the Hash (PtH) has become one of the most widespread attacks affecting our customers. Many of our customers have made it their top priority to address PtH. In response, Microsoft has assembled a workgroup to investigate effective and practical mitigations that could be used now as well as future platform modifications. This presentation covers the problem of credential theft and re-use, focusing on Pass-the-Hash attacks as an example, and discusses Microsoft’s recommended mitigations. The presenters are members of the Cybersecurity Services team.

Day:

3

Session Type:

Breakout

Code:

ATC-B210

Room:

Room 265

Embed

Download

The Discussion

  • User profile image
    B3NT

    One of the questions from the audience was about smart cards with "dynamic groups"...does anyone know what he is talking about?

Conversation locked

This conversation has been locked by the site admins. No new comments can be made.