Microsoft Download Center Archive

Mitigating Pass-the-Hash (PtH) Attacks and Other Credential Theft, Version 1 and 2

  • Published:
  • Version: 2.0
  • Product: Windows
  • Language: English

This document discusses Pass-the-Hash (PtH) attacks against the Windows operating systems and provides holistic planning strategies that, when combined with the Windows security features, will provide a more effective defense against pass-the-hash attacks.

This document discusses Pass-the-Hash (PtH) attacks against the Windows operating systems and encourages organizations to assume that a breach has already occurred in order to highlight the need for a more mature defense. It provides holistic planning strategies that IT pros should consider implementing when architecting a credential theft defense. These strategies, when combined with the Windows security features, will provide a more effective defense against pass-the-hash attacks.

Files

Status: Live

This download is still available on microsoft.com. The downloads below will come directly from the Microsoft Download Center.

Files
Mitigating Pass-the-Hash (PtH) Attacks and Other Credential Theft Techniques_English.pdf
    Mitigating-Pass-the-Hash-Attacks-and-Other-Credential-Theft-Version-2.pdf
    • SHA1: 089f59a75ba5914795163cb156387f2bc7005f40
    • Size: 929 KB

    File sizes and hashes are retrieved from the Wayback Machine’s indexes. They may not match the latest versions of files hosted on Microsoft servers.

    System Requirements

    Operating Systems: Windows Server 2012, Windows Server 2003, Windows Vista, Windows Server 2008, Windows XP, Windows 7, Windows 2000 Server, Windows 8

    Any supported Operating System

    Installation Instructions

    Download the PDF.

    This page was generated from a snapshot of the Microsoft Download Center made on .