Summary
The effectiveness of pass the hash attacks have been demonstrated and discussed throughout this chapter to build an understanding of why hackers use this attack. It is important as a cyber security professional to understand the vulnerabilities found within authentication protocols and hash functions. Understanding how NTLM and Kerberos authenticate users is fundamental in creating strong defenses against password attacks. It is recommended to keep up to date on new changes to authentication protocols, to not fall victim to unforeseen vulnerabilities. Knowing how to use different types of passing and crack hashing tools will allow for much better awareness against this type of attack in the future. Remember the lessons from the Target ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access