Detecting Pass-the-Hash with Honeypots
Thu, 09 Aug 2018 00:54:42 GMT
Jeff Warren of StealthBits and I were talking about this really cool idea he had a while back About detecting pass the hash attacks with a special kind of honey pot. Jeff is doing a webinar on this on Thursday August 9, 2018 and here’s more information about it and the links.
Pass-the-hash and pass-the-ticket attacks can be some of the most effective techniques for attackers to use to move laterally throughout your organization, and also the most difficult to detect. Most detections rely on differentiating between what is normal behavior for a user and what is abnormal. While this can be effective, it is also time consuming and results in lots of false positives. In this webinar, Jeff will explore how to use modern honeypot techniques to lay traps for attackers and emphatically detect the use of the pass-the-hash technique within your organization.
If you are unable to join the live webinar, register to receive a video recording after the event.
Use the links below to register for this very technical webinar:
https://go.stealthbits.com/Sb-webinar-detecting-pass-the-hash-honeypots
http://bit.ly/2vir0S3
email this
•
digg
•
reddit
•
dzone
comments (0)
•
references (0)
Related:
Severing the Horizontal Kill Chain: The Role of Micro-Segmentation in Your Virtualization Infrastructure
Detecting Pass-the-Hash with Honeypots
5 Indicators of Endpoint Evil
Live with Dell at RSA 2015
previous | next
powered by Bloget™