Pass-the-Hash: One of the Most Prevalent Yet Underrated Attacks for Credentials Theft and Reuse.
Dimo DimovYulian TzonevPublished in: CompSysTech (2017)
Keyphrases
- insider threat
- identity theft
- countermeasures
- information security
- malicious attacks
- data structure
- software reuse
- malicious users
- access control
- hash functions
- security threats
- cryptographic protocols
- trust negotiation
- hashing algorithm
- chosen plaintext
- security architecture
- traffic analysis
- security protocols
- sensitive data
- rfid tags
- watermarking scheme
- personal information
- security risks
- private data