pass-the-hash
How It Works (Step-by-Step) 🛡️ Why It’s Dangerous 🔐 Mitigation Strategies Defense Layer Action Credential Hygiene Use unique local admin passwords (LAPS), enforce password rotation Memory Protection Enable Credential Guard, isolate LSASS Logging & Detection Monitor for LSASS access, unusual SMB/RDP logins Network Segmentation Limit lateral movement paths, restrict admin access MFA & PAM Use […]