Pass the Hash Attack

Security Lit Limited
InfoSec Write-ups
Published in
6 min readNov 21, 2022

--

Photo by Gursimrat Ganda on Unsplash

We hear about breaches on a daily basis, and sometimes even about system compromises, so what stages does the attacker take and how does he infiltrate the entire system are unknown. Let us be clear about this.

From an attacker’s perspective, there are 5 stages involved in compromising a system/network. They are:

  1. Reconnaissance: It is used to collect information about the system and can be both active…

--

--