What is pass-the-hash (PtH) attack and why does it bypass traditional password security?

Cybersecurity Fundamentals Hard

Cybersecurity Fundamentals — Hard

What is pass-the-hash (PtH) attack and why does it bypass traditional password security?

Key points

  • PtH attack bypasses password cracking by using captured hashes directly
  • Adversaries can authenticate without knowing the actual password
  • NTLM hashes are vulnerable to PtH attacks due to their design

Ready to go further?

Related questions