Pass-the-Hash: How Attackers Spread and How to Stop Them

  • Wednesday, February 26, 2014 | 10:40 AM – 11:40 AM | West | Room: 3006

View all Sessions

Pass-the-hash transforms the breach of one machine into a total compromise of infrastructure. The publication of attacks and lack of tools to respond have forced enterprises to rely on onerous and ineffective techniques. In this talk, we will decompose the PtH threat, show how the attack is performed and how it can be addressed using new platform technologies in Windows 8.1.


This document was retrieved from on Sun, 29 Nov 2015 05:33:34 -0500.
© 2015 EMC Corporation. All rights reserved.