Pass the Hash

We are all hearing about new vulnerabilities discovered daily in our applications and infrastructure. But that doesn’t mean that our past demons and hacks are gone.

Pass-the-Hash hacking technique was first published in 1997 but is still challenged by hacker toolkits nowadays exploiting the good old Windows NTLM authentication mechanism. 

The point is, to KNOW your cyber security works today, you need to validate against the latest threats but also perform “regression testing” for past exploits that are still in use.

This has ceased to be a person’s job – this is a job for software.