Microsoft Download Center Archive
![]() | Mitigating Pass-the-Hash (PtH) Attacks and Other Credential Theft, Version 1 and 2 |
This document discusses Pass-the-Hash (PtH) attacks against the Windows operating systems and provides holistic planning strategies that, when combined with the Windows security features, will provide a more effective defense against pass-the-hash attacks.
- This document discusses Pass-the-Hash (PtH) attacks against the Windows operating systems and encourages organizations to assume that a breach has already occurred in order to highlight the need for a more mature defense. It provides holistic planning strategies that IT pros should consider implementing when architecting a credential theft defense. These strategies, when combined with the Windows security features, will provide a more effective defense against pass-the-hash attacks.
Files
![]() | Status: LiveThis download is still available on microsoft.com. The downloads below will come directly from the Microsoft Download Center. |
File | Size |
---|---|
![]() SHA1: 4bdfacf23ec1479c1fcf8b2e9bbc5c02e8e3bae2 | 1.10 MB |
![]() SHA1: 089f59a75ba5914795163cb156387f2bc7005f40 | 928 KB |
File sizes and hashes are retrieved from the Wayback Machine’s indexes. They may not match the latest versions of files hosted on Microsoft servers.
System Requirements
Operating Systems: Windows 2000 Server, Windows 7, Windows 8, Windows Server 2003, Windows Server 2008, Windows Server 2012, Windows Vista, Windows XP
- Any supported Operating System
Installation Instructions
- Download the PDF.