At some point when an attacker or a malicious user acquires the password hash, its not necessary decrypt it to get access to the resource, the has can be passed as it is. In a pass-the-hash attack, an attacker steals a user’s password hash (a one-way, encrypted representation of the password) instead of the actualContinue reading “Pass-the-Hash (PtH) Attack”
Tag Archives: hacking
DDoS Attack: An Analysis with Wireshark
Distributed Denial of Service (DDoS) attacks have become a prevalent threat in the digital landscape, disrupting online services and causing significant downtime. To safeguard against these attacks, network administrators and cybersecurity professionals employ various tools and techniques. In this article, we’ll explore how Wireshark, a widely-used network protocol analyzer, can be utilized to analyze andContinue reading “DDoS Attack: An Analysis with Wireshark”