diff --git a/src/data/roadmaps/cyber-security/content/pass-the-hash@sMuKqf27y4iG0GrCdF5DN.md b/src/data/roadmaps/cyber-security/content/pass-the-hash@sMuKqf27y4iG0GrCdF5DN.md index e69de29bb..6781f1f12 100644 --- a/src/data/roadmaps/cyber-security/content/pass-the-hash@sMuKqf27y4iG0GrCdF5DN.md +++ b/src/data/roadmaps/cyber-security/content/pass-the-hash@sMuKqf27y4iG0GrCdF5DN.md @@ -0,0 +1,8 @@ +# Pass the Hash + +Pass the Hash (PtH) is a hacking technique that allows an attacker to authenticate to a remote server or service using the hashed value of a user's password, without needing to know the actual plaintext password. This method exploits weaknesses in the way some authentication protocols handle hashed credentials, particularly in Windows-based systems. + +Visit the following resources to learn more: + +- [@article@What is a pass-the-hash attack?](https://www.crowdstrike.com/cybersecurity-101/pass-the-hash/) +- [@article@Pass the Hash Attack](https://www.netwrix.com/pass_the_hash_attack_explained.html)