Pass-the-Hash, an attack leveraging stolen credentials, is often used in advanced threats and represents a significant risk to organizations. This technique involves an attacker stealing account credentials from one computer, and using them to authenticate to other access points in a network. Instead of requiring plaintext passwords, Pass-the-Hash attacks allow the attacker to authenticate with password hashes.
Discovery & Audit (DNA)
Scan your network with CyberArk DNA™ to: Discover where privileged accounts exist Clearly assess privileged account security risks Identify machines vulnerable to Pass-the-Hash attacks Collect reliable and comprehensive audit information