AskPtH Video Series

I am sure most everyone has heard something about Pass-the-Hash.  For those of you that don't know what I am referring too I'll share a simple overview.   The Pass-the-Hash (PtH) attack and other credential theft and reuse types of attack use an iterative two stage process. First, an attacker must obtains local administrative access on…