CYBER SMART: What is the hacking technique used by attackers to authenticate using underlying NTLM?

By Jordan True

Question of the Week: What is the hacking technique used by attackers to authenticate using underlying NTLM?

Answer: Pass the Hash

Pass the Hash is a very popular attack that takes just minutes to escalate. When successful, an attacker can capture a password hash for a domain admin account instantly. Once the hash is compromised, it can be used to move horizontally across the network, giving the attacker access to whatever that credential unlocks. Take a 15 minute crash course to learn how to protect yourself from pass the hash attacks.

Are you an InfoSec trivia guru?

Each Friday we’ll test your InfoSec knowledge! Whether you’re new to the industry or a seasoned InfoSec veteran, these questions will get your circuits reeling. Questions are posted on social media every Friday.

Source:: Thycotic