We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
78,585 News Articles

Prevent your systems from being hijacked: A quick guide

Thwart 'passing-the-hash' attacks by following these steps

It's time to rethink some old, and now outdated, security truisms that enable a very scary kind of attack.

As computing power and programming prowess have increased, so have the means to make this attack simple, effective and lightning-quick, to the point where it's now a huge risk. Tools are freely available to let someone own your entire Active Directory infrastructure in a matter of minutes, without brute-force cracking or any other compute-intensive resources.

The attack is not new: It's known as a "passing-the-hash" attack, and it's been around for years. Those proficient in security matters know of the attack and the general principle behind it: Passwords are converted by Windows into a "hash" -- a fixed-size string of cryptographically transformed data -- every time they are created. This way, your passwords aren't sitting in plain text anywhere on your machine, nor are they transmitted in clear text when the authentication happens over the wire.

To continue reading, register here to become an Insider. You'll get free access to premium content from CIO, Computerworld, CSO, InfoWorld, and Network World. See more Insider content or sign in.


IDG UK Sites

Samsung Galaxy S6 release date and specs rumours: When will the Galaxy S6 come out?

IDG UK Sites

How to win iTunes Festival 2014 tickets: See Pharrell Williams, Sam Smith, Kylie & more live, for...

IDG UK Sites

Microsoft's all or nothing bet on Windows Phone is the best way forward

IDG UK Sites

Google adds better type rendering to its Chrome browser on Windows