Loading...
Please wait, while we are loading the content...
Similar Documents
Why Crack When You Can Pass the Hash?
| Content Provider | Semantic Scholar |
|---|---|
| Author | Hummel, Christopher |
| Copyright Year | 2015 |
| Abstract | A weakness exists in the design of Windows unsalted password hashing mechanism. The static nature of this password hash provides the means for someone to masquerade as another user if the victim's hash can be obtained. While the concept of passing a Windows password hash has been around for some time, the release of publicly available tools has taken the first major step towards harnessing the true power of this attack. Although such tools have not yet targeted Microsoft's implementation of Kerberos, all organizations are strongly encouraged to move towards pure Kerberos deployments in preparation for PKI integration. The evolving nature of this attack puts under pressure the issue of passwords as a valid identifier thus requiring organizations to use an alternate credential form such as digital certificates. |
| File Format | PDF HTM / HTML |
| Alternate Webpage(s) | https://www.sans.org/reading-room/whitepapers/testing/crack-pass-hash-33219 |
| Alternate Webpage(s) | http://www.sans.org/reading-room/whitepapers/testing/crack-pass-hash-33219 |
| Language | English |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Article |