TWC: Pass-the-Hash: How Attackers Spread and How to Stop Them

Sign in to queue

Description

Pass-the-hash transforms the breach of one machine into total compromise of infrastructure. The publication of attacks and lack of tools to respond have forced enterprises to rely on onerous and ineffective techniques. In this session, we deconstruct the PtH threat, show how the attack is performed, and how it can be addressed using new features and functionality recently introduced in Windows.

For more information, check out this course on Microsoft Virtual Academy:

Day:

2

Session Type:

Breakout

Code:

DCIM-B359

Room:

Grand Ballrm C

Embed

Download

Download this episode

For more information, check out this course on Microsoft Virtual Academy:

The Discussion

Add Your 2 Cents