Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,287,046 papers from all fields of science
Search
Sign In
Create Free Account
Pass the hash
Known as:
Pass-the-hash
In cryptanalysis and computer security, pass the hash is a hacking technique that allows an attacker to authenticate to a remote server/service by…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
31 relations
Antivirus software
Application programming interface
Brute-force attack
Code injection
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Analysis and Impact of Different Mechanisms of Defending Pass-the-Hash Attacks
N. Jadeja
,
Madhuri V. Vaghasia
2018
Corpus ID: 169355657
Pass-the-hash attack has been around more than 18 years, and founded roots of its first existence were around 1997. The reason…
Expand
2016
2016
Detecting Lateral Movement Attacks through SMB using BRO
I. Ullah
2016
Corpus ID: 55054284
The purpose of this study is to develop an anomaly based intrusion detection technique to detect lateral movement attack and…
Expand
2016
2016
Security Resilience: Exploring Windows Domain-Level Defenses Against Post-Exploitation Authentication Attacks
Jeffrey A. Nichols
,
Benjamin A. Taylor
,
Laura Curtis
Cyber and Information Security Research…
2016
Corpus ID: 16066928
We investigated the security resilience of the current Windows Active Directory (AD) environments to Pass-the-Hash and Pass-the…
Expand
2016
2016
Design Diversity for Mitigating Monoculture Induced Threats
Qi Cheng
,
K. Kwiat
,
Charles A. Kamhoua
IEEE International Symposium on High-Assurance…
2016
Corpus ID: 38955556
Monoculture induced threats such as "pass the hash" attacks can spread more easily through a system of similar components…
Expand
2015
2015
Why Crack When You Can Pass the Hash?
C. Hummel
2015
Corpus ID: 16400600
A weakness exists in the design of Windows unsalted password hashing mechanism. The static nature of this password hash provides…
Expand
2015
2015
Defeating Pass-the-Hash Separation of Powers
Baris Saydag
,
Microsoft Seth Moore
2015
Corpus ID: 34720704
Pass-the-Hash is but one of a family of credential-theft techniques attackers use in order to impersonate users. Once credentials…
Expand
2015
2015
Test case selection for regression testing of applications using web services based on WSDL specification changes
Prerna Singal
,
A. Mishra
,
Latika Singh
International Conference on Computing…
2015
Corpus ID: 10161895
There is much enthusiasm around web services in today's world. Web Services take the advantage of internet to communicate between…
Expand
2014
2014
Private Password Auditing - Short Paper
Amrit Kumar
,
C. Lauradoux
Passwords
2014
Corpus ID: 1990723
Password is the foremost mean to achieve data and computer security. Hence, choosing a strong password which may withstand…
Expand
2014
2014
Αξιολόγηση και εκμετάλλευση ευπαθειών επιθέσεων πελατών
Γεώργιος Κολίτσας
2014
Corpus ID: 215829674
This thesis’ aim is to examine a relative new kind of attack that during the past few years have been climbing in use in an…
Expand
2013
2013
Graph analytics for signature discovery
Emilie Hogan
,
John R. Johnson
,
M. Halappanavar
,
C. Lo
IEEE International Conference on Intelligence and…
2013
Corpus ID: 11085410
Within large amounts of seemingly unstructured data it can be diffcult to find signatures of events. In our work we transform…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE