Cheat sheets

Pass The Hash (PtH) Cyber Attacks

Share this with people that should know this:

Pass the Hash cyber attacks technic used against Microsoft operating stsytem to captures password hashes,The attacker reuse password hashes to authenticate other user over network,PtH attack is very similar to password theft attacks.

The PtH attack technic inplace of capturing plain text passwords captures password hashes.

Howto reduce and  the risk of PtH cyber attacks or other indentity theft attacks;

1. Ristrict and protect high privileges accounts.

2. Ristrict local accounts with administration privileges.

3. Ristrict and protect all inbound trafics to all work stations and use Windows firewall to configure exceptions for trusted connections sources like security compliances servers and scaners,approved applications.

Download Microsoft document discusses Pass-the-Hash (PtH) attacks.

Share this with people that should know this: