Nytro Posted January 16, 2015 Report Posted January 16, 2015 Pass-the-hash attacks: Tools and MitigationAlthough pass-the-hash attacks have been around for a little over thirteen years, the knowledge of its existence is still poor. This paper tries to fill a gap in the knowledge of this attack through the testing of the freely available tools that facilitate the attack. While other papers and resources focus primarily on running the tools and sometimes comparing them, this paper offers an in-depth, systematic comparison of the tools across the various Windows platforms, including AV detection rates. It also provides exte...Copyright SANS InstituteAuthor Retains Full RightsPass-the-hash attacks: Tools and MitigationGIAC (GCIH) Gold CertificationAuthor: Bashar Ewaida, bashar9090@live.comAdvisor: Kristof BoeynaemsAccepted: January 21st 2010AbstractAlthough pass-*?the-*?hash attacks have been around for a little over thirteen years, theknowledge of its existence is still poor. This paper tries to fill a gap in the knowledge ofthis attack through the testing of the freely available tools that facilitate the attack.While other papers and resources focus primarily on running the tools and sometimescomparing them, this paper offers an in-*?depth, systematic comparison of the toolsacross the various Windows platforms, including AV detection rates. It also providesextensive advice to mitigate pass-*?the-*?hash attacks and discusses the pros and cons ofsome of the approaches used in mitigating the attack.Download: https://www.sans.org/reading-room/whitepapers/testing/pass-the-hash-attacks-tools-mitigation-33283 Quote