Reducing the Effectiveness of Pass-the-Hash (version 1)
This document discusses mitigations administrators can deploy, in the interim, to reduce PtH’s effectiveness by addressing some of the properties it depends upon.
19 November 2013 17 page(s) pdf
Limit Workstation-to-Workstation Communication
Compromise of just one user workstation can lead to the loss of an entire network. All it takes is an unsuspecting user to click on a malicious email attachment or visit an infected website for an adversary to obtain access...
22 June 2016 2 page(s) pdf
Spotting the Adversary with Windows Event Log Monitoring (version 2)
This paper focuses on using the built-in tools already available in the Microsoft Windows operating system (OS). Central event log collection requires a Windows Server operating system version 2003 R2 or above. Many commercially available tools exist for central event...
07 August 2015 54 page(s) pdf
Add all new keywords to this page so they will show in the keyword list for all pages below.
22 December 2015
1-4 of 4 results returned for: "keywords:"Pass-the-Hash - PtH""