Exploring Pass-the-hash, authentication, authorization, and security groups
Greg Bell –
Q: What authentication is being “two factored”? For instance; is a pass the hash technique, where the Hash from an admin is captured and used to connect to another machine through e.g. smb, always made impossible because a two factor authentication is required? Or is pass the hash still possible because you’ll only prevent an RDP from being single factor?
Read More »