Today I watched a very interesting presentation about “Pass-The-Hash” and other credential theft and reuse scenarios. In addition to the presentation, there is also a document with more detailed info.
–
Presentation: Pass the Hash and Other Credential Theft and Reuse: Preventing Lateral Movement and Privilege Escalation
Document: Mitigating Pass-the-Hash (PtH) Attacks and Other Credential Theft Techniques
–
Information about the tool (Windows Credential Editor, WCE) used:
–
WARNING: DO NOT USE THESE TOOLS IN ANY PRODUCTION ENVIRONMENT! ONLY USE IT IN YOUR ISOLATED TEST ENVIRONMENT AFTER APPROVAL!!!
–
Cheers,
Jorge
———————————————————————————————
* This posting is provided "AS IS" with no warranties and confers no rights!
* Always evaluate/test yourself before using/implementing this!
* DISCLAIMER: https://jorgequestforknowledge.wordpress.com/disclaimer/
———————————————————————————————
############### Jorge’s Quest For Knowledge #############
######### http://JorgeQuestForKnowledge.wordpress.com/ ########
———————————————————————————————