Pass-the-Hash II: The Wrath of Hardware

  • Thursday, April 23, 2015 | 10:20 AM – 11:10 AM | West | Room: 3018

View all Sessions

Credential theft is the cornerstone of the world’s most devastating breaches. For over a decade, attackers have used this blueprint to own networks, exploiting weaknesses in symmetric credentials. Building on last year’s Pass-the-Hash defense talk, this session will demonstrate how a modern OS can utilize new hardware capabilities to strongly protect even NTLM and Kerberos from credential theft.


This document was retrieved from on Sun, 18 Aug 2019 06:59:48 -0400.