Menu

Pass-the-Hash II: The Wrath of Hardware

  • Thursday, April 23, 2015 | 10:20 AM – 11:10 AM | West | Room: 3018

View all Sessions

Credential theft is the cornerstone of the world’s most devastating breaches. For over a decade, attackers have used this blueprint to own networks, exploiting weaknesses in symmetric credentials. Building on last year’s Pass-the-Hash defense talk, this session will demonstrate how a modern OS can utilize new hardware capabilities to strongly protect even NTLM and Kerberos from credential theft.

Participants

This document was retrieved from https://www.rsaconference.com/events/us15/agenda/sessions/1620/pass-the-hash-ii-the-wrath-of-hardware on Thu, 29 Sep 2016 16:25:04 -0400.
© 2016 EMC Corporation. All rights reserved.