Skip to search formSkip to main contentSkip to account menu

Pass the hash

Known as: Pass-the-hash 
In cryptanalysis and computer security, pass the hash is a hacking technique that allows an attacker to authenticate to a remote server/service by… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Pass-the-hash attack has been around more than 18 years, and founded roots of its first existence were around 1997. The reason… 
2016
2016
The purpose of this study is to develop an anomaly based intrusion detection technique to detect lateral movement attack and… 
2016
2016
We investigated the security resilience of the current Windows Active Directory (AD) environments to Pass-the-Hash and Pass-the… 
2016
2016
Monoculture induced threats such as "pass the hash" attacks can spread more easily through a system of similar components… 
2015
2015
A weakness exists in the design of Windows unsalted password hashing mechanism. The static nature of this password hash provides… 
2015
2015
Pass-the-Hash is but one of a family of credential-theft techniques attackers use in order to impersonate users. Once credentials… 
2015
2015
There is much enthusiasm around web services in today's world. Web Services take the advantage of internet to communicate between… 
2014
2014
Password is the foremost mean to achieve data and computer security. Hence, choosing a strong password which may withstand… 
2014
2014
This thesis’ aim is to examine a relative new kind of attack that during the past few years have been climbing in use in an… 
2013
2013
Within large amounts of seemingly unstructured data it can be diffcult to find signatures of events. In our work we transform…