Solution Brief: Pass-The-Hash

December 17, 2019

Pass-the-Hash, an attack leveraging stolen credentials, is often used in advanced threats and represents a significant risk to organizations. This technique involves an attacker stealing account credentials from one computer, and using them to authenticate to other access points in a network. Instead of requiring plaintext passwords, Pass-the-Hash attacks allow the attacker to authenticate with password hashes.

Previous Flipbook
CyberArk DNA™ Datasheet
CyberArk DNA™ Datasheet

CyberArk Discovery & Audit (DNA) is a powerful tool – available at no charge – that scans systems on your n...

Next Flipbook
Securing Privileged Access in Telecommunications Networks
Securing Privileged Access in Telecommunications Networks

CyberArk solutions can help telecommunications service providers strengthen privileged access security, def...