Adversaries may “pass the hash” using stolen password hashes to move laterally within an environment, bypassing normal system access controls.
Sub-technique of
T1550
See: MITRE ATT&CK
Adversaries may “pass the hash” using stolen password hashes to move laterally within an environment, bypassing normal system access controls.
Sub-technique of
T1550
See: MITRE ATT&CK