Home / Knowledge Base / Resources / Pass the Hash Guidance

What is Pass the Hash Guidance

Leading provider of free cybersecurity training resources

This project contains scripts for...

This project contains scripts designed to assist administrators in implementing Pass the Hash mitigations, as detailed in the paper titled 'Reducing the Effectiveness of Pass the Hash.'

The PtHTools Module Overview and Usage

The PtHTools module includes the primary commands designed to assist with the implementation of Pass-the-Hash (PtH) mitigations: - Find-PotentialPtHEvents - Invoke-DenyNetworkAccess - Edit-AllLocalAccountPasswords - Get-LocalAccountSummaryOnDomain - Invoke-SmartcardHashRefresh - Find-OldSmartcardHash For detailed instructions on how to use these commands, please refer to the PtHTools readme file. Guidance for Reducing the Effectiveness of Pass-the-Hash includes: - Managing Long-Lived Hashes for Active Directory Smartcard Required Accounts - Limiting Workstation-to-Workstation Communication For more information, refer to Microsoft's guidance here: https://aka.ms/pth - This link leads to Microsoft's general resource page on Pass-the-Hash. Additional resources include: - Mitigating Pass-the-Hash and Other Credential Theft v1 - Mitigating Pass-the-Hash and Other Credential Theft v2

Understanding How Pass-the-Hash Functions

Understanding How Pass-the-Hash Functions Local Administrator Password Solution - LAPS is a Microsoft-supported tool designed to ensure that local administrator accounts do not share the same password.

An Alternative to the Edit-AllLocalAccountPasswords Command

This serves as an alternative to the Edit-AllLocalAccountPasswords command found in PtHTools. krbtgt Refresh Script - This script resets the krbtgt account password two times to invalidate the hash.
 

Pass the Hash Guidance Reviews

Write a Review

No reviews yet. Be the first to review this tool!

Write a Review

Share your experience with Pass the Hash Guidance tool and help others make informed decisions.

Featured

Specops Software
Free

Specops Software View Specops Software

Specops Software empowers organizations to fortify their IT security by addressing the critical vulnerability of password management and authentication. As a premier vendor, Specops Software provides advanced solutions designed to proactively block weak passwords, enforce robust authentication protocols, and ensure compliance with stringent industry standards like CJIS and HITRUST. With deep native integration into Active Directory and on-premises data storage, Specops Software offers unparalleled security and control for sensitive business data.

Active Directory password policy auditing against compliance standards
Breached password detection for over 900 million known compromised passwords
Zero-trust access evaluation and enhancement
Infisical
Free

Infisical View Infisical

Infisical is the premier open-source platform designed for unified management of secrets, certificates, and configurations across your entire organization. It seamlessly integrates into your development workflows, CI/CD pipelines, and cloud infrastructure, ensuring secure storage and automated injection of sensitive information. Empower your team with robust features like versioning, point-in-time recovery, comprehensive audit logging, and automated secret rotation for enhanced security and operational efficiency.

Open-source secrets management platform
Unified management of secrets, certificates, and configs
Seamless integration with development workflows and CI/CD
Click Studios
Free

Click Studios View Click Studios

Click Studios is an Australian-based Agile software development company dedicated to evolving Passwordstate, their robust Enterprise Password Management solution. Continuously refined through customer insights and cybersecurity advancements, Passwordstate offers advanced features for secure sensitive information management and stringent compliance. Click Studios provides scalable, secure, and user-friendly password management solutions, empowering businesses globally with affordable and reliable access control.

Secure Enterprise Password Management
Continuous Feature Enhancement
Customer Feedback Driven Development

Similar Tools

SANS Institute
Free

SANS Institute View SANS Institute

The SANS Institute is the world's most trusted and largest provider of information security training and certification. Committed to advancing cybersecurity, SANS offers an extensive, no-cost collection of research documents and operates the Internet Storm Center for early threat detection. Since its founding in 1989, SANS has empowered over 165,000 security professionals globally through collaborative learning and the development of practical solutions for complex information security challenges.

Industry-leading cybersecurity training and certification programs
Extensive and free repository of information security research documents
Operates the Internet Storm Center for real-time threat intelligence
Cybrary
Free

Cybrary View Cybrary

Cybrary is a premier open-source platform for cybersecurity and IT professionals, offering a comprehensive ecosystem for learning and skill development. Access an ever-expanding catalog of online courses, hands-on labs, and certification preparation materials designed to empower individuals and organizations in the fight against evolving cyber threats. Our curated Skill and Career Paths, coupled with threat-informed training, provide the essential knowledge and practical experience needed to excel in the dynamic cybersecurity landscape.

Open-source learning platform
Extensive catalog of cybersecurity and IT courses
Hands-on labs and experiential tools
YouTube
Free

YouTube View YouTube

Level 400 training to become a Microsoft Sentinel Ninja.

Workshop Hacking Bluetooth Smart locks
Free

Workshop Hacking Bluetooth Smart locks View Workshop Hacking Bluetooth Smart locks

One of the oldest hacker conventions in America, offering a unique and personal experience.

5.0
Windows / Linux Local Privilege Escalation Workshop
Free

Windows / Linux Local Privilege Escalation Workshop View Windows / Linux Local Privilege Escalation Workshop

A practical guide to developing a comprehensive security monitoring and incident response strategy, covering incident response fundamentals, threat analysis, and data analysis.

Webhacking.kr
Free

Webhacking.kr View Webhacking.kr

Archive of information, tools, and references regarding CTF competitions.