Pass-the-Hash II: The Wrath of Hardware

  • Thursday, April 23, 2015 | 10:20 AM – 11:10 AM | West | Room: 3018

View all Sessions

Credential theft is the cornerstone of the world’s most devastating breaches. For over a decade, attackers have used this blueprint to own networks, exploiting weaknesses in symmetric credentials. Building on last year’s Pass-the-Hash defense talk, this session will demonstrate how a modern OS can utilize new hardware capabilities to strongly protect even NTLM and Kerberos from credential theft.


This document was retrieved from on Tue, 13 Nov 2018 21:29:41 -0500.