Cybersecurity Fundamentals — Hard
Key points
- PtH attack bypasses password cracking by using captured hashes directly
- Adversaries can authenticate without knowing the actual password
- NTLM hashes are vulnerable to PtH attacks due to their design
Ready to go further?
Related questions
