An attack technique where an attacker captures a password hash and uses it directly to authenticate without knowing the actual password. This exploits authentication protocols like NTLM that accept hashes for verification.
Related Terms
Credential Harvesting
phishingThe process of collecting usernames, passwords, and other authentication credentials through fake login pages, keylogger...
Hashing
data-protectionA one-way function that converts input data into a fixed-length string of characters. Unlike encryption, hashing cannot...
Kerberos
authenticationA network authentication protocol that uses tickets to allow nodes to prove their identity securely over non-secure netw...