Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
In the recent months, we have seen more and more targeted attacks towards our customers. A lot of them use a technique called Pass the Hash. This made us publishing a paper, which explains Pass the Hash but much more important shows some fairly simple to implement mitigations against this type of attack. As they are fairly prevalent currently, I would urge you reading through the paper and implement the mitigations:
Mitigating Pass-the-Hash (PtH) Attacks and Other Credential Theft Techniques.
Roger