Skip to main content

Solution Brief: Pass-The-Hash

Learn about Pass-the-Hash, an advanced cyberattack in which an attacker steals account credentials from one computer, then uses them to authenticate to other access points in a network.

Download PDF

Pass-the-Hash, an attack leveraging stolen credentials, is often used in advanced threats and represents a significant risk to organizations. This technique involves an attacker stealing account credentials from one computer, and using them to authenticate to other access points in a network. Instead of requiring plaintext passwords, Pass-the-Hash attacks allow the attacker to authenticate with password hashes.