Source |
LogPoint |
Identifiant |
7002458 |
Date de publication |
2022-09-14 09:03:14 (vue: 2022-09-19 14:05:45) |
Titre |
Detect, mitigate and respond to WDigest attacks with Logpoint |
Texte |
>by Nilaa Maharjan, Security ResearchInternal penetration testing often requires security specialists to attempt to extract passwords from the memory of infected machines. If the acquired credentials are hashed, the tester can use the pass-the-hash approach to travel laterally within the network to accomplish their goals. This technique was frequently used in the past and is [...]
|
Envoyé |
Oui |
Condensat |
>by accomplish acquired approach are attacks attempt can credentials detect extract frequently from goals hash hashed infected laterally logpoint machines maharjan memory mitigate network nilaa often pass passwords past penetration requires researchinternal respond security specialists technique tester testing travel use used wdigest within |
Tags |
|
Stories |
|
Notes |
|
Move |
|