+1-202-802-9399 (US)
The Lockdown

Thycotic’s Cyber Security Blog

CYBER SMART: What is the hacking technique used by attackers to authenticate using underlying NTLM?

Written by Jordan True

August 19th, 2016

Answer: Pass the Hash

Pass the Hash is a very popular attack that takes just minutes to escalate. When successful, an attacker can capture a password hash for a domain admin account instantly. Once the hash is compromised, it can be used to move horizontally across the network, giving the attacker access to whatever that credential unlocks. Take a 15 minute crash course to learn how to protect yourself from pass the hash attacks.

Are you an InfoSec trivia guru?

Each Friday we’ll test your InfoSec knowledge! Whether you’re new to the industry or a seasoned InfoSec veteran, these questions will get your circuits reeling. Questions are posted on social media every Friday.

 

Like this post?

Get our top blog posts delivered to your inbox once a month.

SHARE THIS


The following two tabs change content below.

Jordan True

Jordan is a social media strategist, digital community manager and a lover of all things IT. She currently manages the Social Media Program at Thycotic and loves to connect with technology communities online and at enterprise IT events. Addicted to the outdoors, you can find Jordan on the running trails in her free time or sharing the latest InfoSec buzz on Twitter @ThycoticJordan.