TWC: Pass-the-Hash: How Attackers Spread and How to Stop Them
Pass-the-hash transforms the breach of one machine into total compromise of infrastructure. The publication of attacks and lack of tools to respond have forced enterprises to rely on onerous and ineffective techniques. In this session, we deconstruct the PtH threat, show how the attack is performed, and how it can be addressed using new features and functionality recently introduced in Windows.
Event HomepageTechEd North America 2014
More episodes in this series
Comments have been closed since this content was published more than 30 days ago, but if you'd like to send us feedback you can Contact Us.