Pass The Hash (PtH) Cyber Attacks

Pass the Hash cyber attacks technic used against Microsoft operating stsytem to captures password hashes,The attacker reuse password hashes to authenticate other user over network,PtH attack is very similar to password theft attacks.

The PtH attack technic inplace of capturing plain text passwords captures password hashes.

Howto reduce and  the risk of PtH cyber attacks or other indentity theft attacks;

1. Ristrict and protect high privileges accounts.