Geek Culture
Published in

Geek Culture

Pass the Hash Attack

Photo by Gursimrat Ganda on Unsplash

We hear about breaches on a daily basis, and sometimes even about system compromises, so what stages does the attacker take and how does he infiltrate the entire system are unknown. Let us be clear about this.

From an attacker’s perspective, there are 5 stages involved in compromising a system/network. They are:

  1. Reconnaissance: It is used to collect information about the system and can be both active…

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store