Solution Brief: Pass-The-Hash

December 17, 2019

Pass-the-Hash, an attack leveraging stolen credentials, is often used in advanced threats and represents a significant risk to organizations. This technique involves an attacker stealing account credentials from one computer, and using them to authenticate to other access points in a network. Instead of requiring plaintext passwords, Pass-the-Hash attacks allow the attacker to authenticate with password hashes.

Previous Article
CyberArk DNA™ Datasheet
CyberArk DNA™ Datasheet

CyberArk Discovery & Audit (DNA) is a powerful tool – available at no charge – that scans systems on your n...

Next Article
CyberArk Red Team Cloud Security Services
CyberArk Red Team Cloud Security Services

The CyberArk Red Team offers cloud-focused expertise to help internal teams hone their skills in a safe env...