Pass-the-Hash: How Attackers Spread and How to Stop Them

  • Wednesday, February 26, 2014 | 10:40 AM – 11:40 AM | West | Room: 3006
View all Sessions

Pass-the-hash transforms the breach of one machine into a total compromise of infrastructure. The publication of attacks and lack of tools to respond have forced enterprises to rely on onerous and ineffective techniques. In this talk, we will decompose the PtH threat, show how the attack is performed and how it can be addressed using new platform technologies in Windows 8.1.

Participants

This document was retrieved from http://www.rsaconference.com/events/us14/agenda/sessions/1061/pass-the-hash-how-attackers-spread-and-how-to-stop on Sat, 25 Oct 2014 02:59:05 -0400.
© 2014 EMC Corporation. All rights reserved.