Presenter Photo

Wherever and whenever you log on to any Windows workstation or servers you leave your password credentials behind. The common knowledge is that when we set up our password in Windows it is hashed and stored either in SAM or a ntds.dit database in Active Directory. This is useful for verification purposes, but if your operating system can re-use the password it means others can decrypt it! Another thing is that when a hash is cached may be reused for authentication later.

Join Paula Januszkiewicz, Enterprise Security MVP and Microsoft Security Trusted Advisor, in this engaging webcast to learn about the famous pass-the-hash attack, learn the encryption and decryption techniques being used nowadays in systems, networks, and applications, and learn how to prevent password credentials from being leaked!

  • How to prevent password credential leakage in Windows
  • How credential attacks work
  • What is the role of cryptography for passwords in Windows
  • How Pass-The-Hash attacks work and how to prevent them