From be3e1859dd02fdcac881f258a45e6ee489d371f7 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Jes=C3=BAs=20Enrique=20Alcal=C3=A1=20Rojas?= Date: Wed, 4 Sep 2024 04:02:27 -0400 Subject: [PATCH] add content pass-the-hash@sMuKqf27y4iG0GrCdF5DN.md (#6830) --- .../content/pass-the-hash@sMuKqf27y4iG0GrCdF5DN.md | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/src/data/roadmaps/cyber-security/content/pass-the-hash@sMuKqf27y4iG0GrCdF5DN.md b/src/data/roadmaps/cyber-security/content/pass-the-hash@sMuKqf27y4iG0GrCdF5DN.md index e69de29bb..6781f1f12 100644 --- a/src/data/roadmaps/cyber-security/content/pass-the-hash@sMuKqf27y4iG0GrCdF5DN.md +++ b/src/data/roadmaps/cyber-security/content/pass-the-hash@sMuKqf27y4iG0GrCdF5DN.md @@ -0,0 +1,8 @@ +# Pass the Hash + +Pass the Hash (PtH) is a hacking technique that allows an attacker to authenticate to a remote server or service using the hashed value of a user's password, without needing to know the actual plaintext password. This method exploits weaknesses in the way some authentication protocols handle hashed credentials, particularly in Windows-based systems. + +Visit the following resources to learn more: + +- [@article@What is a pass-the-hash attack?](https://www.crowdstrike.com/cybersecurity-101/pass-the-hash/) +- [@article@Pass the Hash Attack](https://www.netwrix.com/pass_the_hash_attack_explained.html)