Solution Brief: Pass-The-Hash

December 17, 2019

Pass-the-Hash, an attack leveraging stolen credentials, is often used in advanced threats and represents a significant risk to organizations. This technique involves an attacker stealing account credentials from one computer, and using them to authenticate to other access points in a network. Instead of requiring plaintext passwords, Pass-the-Hash attacks allow the attacker to authenticate with password hashes.

Previous Article
CyberArk Labs: Ransomware
CyberArk Labs: Ransomware

Based on testing by CyberArk Labs, the removal of local administrator rights combined with application cont...

Next Article
CyberArk Red Team Cloud Security Services
CyberArk Red Team Cloud Security Services

The CyberArk Red Team offers cloud-focused expertise to help internal teams hone their skills in a safe env...