Pass-the-hash attacks: Tools and Mitigation

Although pass-the-hash attacks have been around for a little over thirteen years, the knowledge of its existence is still poor. This paper tries to fill a gap in the knowledge of this attack through the testing of the freely available tools that facilitate the attack. While other papers and...
By
Bashar Ewaida
February 23, 2010

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg