Pass-the-hash: A type of exploit where an attacker uses a hashed form of a user’s password instead of the actual password to authenticate against a network service. This kind of attack bypasses the need to decrypt or crack the password and takes advantage of the fact that many systems authenticate users by comparing the hash of the provided password with the stored hash.
Categories: CC D5: Security Operations | CCSP D5: Cloud Security Operations | CISM D3: Information Security Program | CISSP D7: Security Operations | Security+ D2: Threats Vulnerabilities and Mitigations | SSCP D6: Network and Communication Security
« Back to Glossary Index