Phone Number +1-202-802-9399 (US)
The Lockdown

Thycotic’s Cyber Security Blog

CYBER SMART: What is the hacking technique used by attackers to authenticate using underlying NTLM?

Written by Jordan True

August 19th, 2016

Answer: Pass the Hash

Pass the Hash is a very popular attack that takes just minutes to escalate. When successful, an attacker can capture a password hash for a domain admin account instantly. Once the hash is compromised, it can be used to move horizontally across the network, giving the attacker access to whatever that credential unlocks. Take a 15 minute crash course to learn how to protect yourself from pass the hash attacks.

Are you an InfoSec trivia guru?

Each Friday we’ll test your InfoSec knowledge! Whether you’re new to the industry or a seasoned InfoSec veteran, these questions will get your circuits reeling. Questions are posted on social media every Friday.

 

Like this post?

Get our top blog posts delivered to your inbox once a month.

SHARE THIS