Mitigating Pass-the-Hash (PtH) Attacks and Other Credential Theft, Version 1 and 2

This document discusses Pass-the-Hash (PtH) attacks against the Windows operating systems and provides holistic planning strategies that, when combined with the Windows security features, will provide a more effective defense against pass-the-hash attacks.