Pass the Hash and Other Credential Theft and Reuse: Mitigating the risk of Lateral Movement and Privilege Escalation

Presented at Black Hat USA 2013, July 31, 2013, 2:15 p.m. (60 minutes)

Pass the Hash (PtH) has become one of the most widespread attacks affecting our customers and many of our customers have made it their top priority to address these attacks. In response, Microsoft has assembled a workgroup to investigate effective and practical mitigations that could be used now as well as future platform modifications. This presentation will cover the problem of credential theft and re-use, focusing on Pass-the-Hash attacks as an example, and discuss Microsoft's recommended mitigations. The presenters are members of the workgroup: Patrick Jungles of the Trustworthy Computing group and Mark Simos of the Cybersecurity Services team.


Presenters:

  • Patrick Jungles - Microsoft
    Patrick Jungles is a Security Program Manager working with Microsoft's Trustworthy Computing group in Redmond. He is currently the security advisor for Windows update, MS App Store, Interactive Entertainment Business (IEB) and also leads the Pass the Hash workgroup at Microsoft. Prior to Microsoft, Patrick was a Security Architect responsible for implementing security controls, designing networks and helping development teams implement secure code. He also has a background in the antivirus industry performing analysis, reverse engineering as well as monitoring the global security threat landscape.
  • Mark Simos - Microsoft
    Mark Simos is a solutions architect on the Microsoft Cybersecurity team focused on credential theft and infrastructure security. Mark co-authored the whitepaper "Mitigating Pass-the-Hash (PtH) Attacks and Other Credential Theft Techniques" and frequently speaks on infrastructure security and cybersecurity topics.

Links:

Similar Presentations: