Microsoft Download Center Archive

Mitigating Pass-the-Hash (PtH) Attacks and Other Credential Theft, Version 1 and 2

  • Published:
  • Version: 2.0
  • Category: Document
  • Language: English

This document discusses Pass-the-Hash (PtH) attacks against the Windows operating systems and provides holistic planning strategies that, when combined with the Windows security features, will provide a more effective defense against pass-the-hash attacks.

  • This document discusses Pass-the-Hash (PtH) attacks against the Windows operating systems and encourages organizations to assume that a breach has already occurred in order to highlight the need for a more mature defense. It provides holistic planning strategies that IT pros should consider implementing when architecting a credential theft defense. These strategies, when combined with the Windows security features, will provide a more effective defense against pass-the-hash attacks.

Files

Status: Live

This download is still available on microsoft.com. The downloads below will come directly from the Microsoft Download Center.

FileSize
Mitigating Pass-the-Hash (PtH) Attacks and Other Credential Theft Techniques_English.pdf
SHA1: 4bdfacf23ec1479c1fcf8b2e9bbc5c02e8e3bae2
1.10 MB
Mitigating-Pass-the-Hash-Attacks-and-Other-Credential-Theft-Version-2.pdf
SHA1: 089f59a75ba5914795163cb156387f2bc7005f40
928 KB

File sizes and hashes are retrieved from the Wayback Machine’s indexes. They may not match the latest versions of files hosted on Microsoft servers.

System Requirements

Operating Systems: Windows 2000 Server, Windows 7, Windows 8, Windows Server 2003, Windows Server 2008, Windows Server 2012, Windows Vista, Windows XP

  • Any supported Operating System

Installation Instructions

  • Download the PDF.

Related Resources