We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
80,259 News Articles

Prevent your systems from being hijacked: A quick guide

Thwart 'passing-the-hash' attacks by following these steps

It's time to rethink some old, and now outdated, security truisms that enable a very scary kind of attack.

As computing power and programming prowess have increased, so have the means to make this attack simple, effective and lightning-quick, to the point where it's now a huge risk. Tools are freely available to let someone own your entire Active Directory infrastructure in a matter of minutes, without brute-force cracking or any other compute-intensive resources.

The attack is not new: It's known as a "passing-the-hash" attack, and it's been around for years. Those proficient in security matters know of the attack and the general principle behind it: Passwords are converted by Windows into a "hash" -- a fixed-size string of cryptographically transformed data -- every time they are created. This way, your passwords aren't sitting in plain text anywhere on your machine, nor are they transmitted in clear text when the authentication happens over the wire.

To continue reading, register here to become an Insider. You'll get free access to premium content from CIO, Computerworld, CSO, InfoWorld, and Network World. See more Insider content or sign in.


IDG UK Sites

New iPhone 6 review: best ever iPhone is very good... but no longer the best phone you can buy

IDG UK Sites

Is Apple losing confidence in itself?

IDG UK Sites

Professional photo and video techniques for perfect colours

IDG UK Sites

How (and where) to buy an iPhone 6 or iPhone 6 Plus in the UK. Plus: What to do if you pre-ordered...