Tag: Threat detection
November 30, 2021 |
Performing Pass-the-Hash Attacks with Mimikatz
Mimikatz has become the standard tool for extracting passwords and hashes from memory, performing pass-the-hash attacks, and creating domain persistence through Golden Tickets. Let’s take a look at how easy Mimikatz makes it to perform pass-the-hash and other authentication-based attacks, and...
November 30, 2021 |
How to Detect Pass-the-Hash Attacks
Attackers frequently rely on lateral movement techniques to infiltrate corporate networks and obtain privileged access to credentials and data. In particular, one common technique is pass-the-hash: Hackers use stolen password hashes to authenticate as a user without ever having the user's...
March 11, 2016 |
Top Five Hottest Trends at RSA 2016 Conference
The 25th 2016 RSA Conference, held in San Francisco, CA, has brought together the record number of attendees from all over the world to discuss major IT industry trends and upcoming challenges. For the past years, RSA Conference has been raising different hot topics, from unstructured data...