Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.

Preventing pass-the-hash and similar impersonation attacks in enterprise infrastructures

Preventing pass-the-hash and similar identity replays in enterprise infrastructures
: Oberle, Alexander; Larbig, Pedro; Marx, Ronald; Weber, Frank G.; Scheuermann, Dirk; Fages, Daniel; Thomas, Fabien

Postprint urn:nbn:de:0011-n-3960666 (508 KByte PDF)
MD5 Fingerprint: 4c8c0fbf7314fdaad3e194f6dd81ed43
© IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
Erstellt am: 15.6.2016

Barolli, L. ; Institute of Electrical and Electronics Engineers -IEEE-; IEEE Computer Society; IEEE Computer Society, Technical Committee on Distributed Processing:
IEEE 30th International Conference on Advanced Information Networking and Applications, AINA 2016. Proceedings : 23-25 March 2016, Crans-Montana, Switzerland
Los Alamitos, Calif.: IEEE Computer Society Conference Publishing Services (CPS), 2016
ISBN: 978-1-5090-1857-4 (Print)
International Conference on Advanced Information Networking and Applications (AINA) <30, 2016, Crans Montana>
Konferenzbeitrag, Elektronische Publikation
Fraunhofer SIT ()
APT; enterprise security; Pass-the-Hash; Pass-the-Ticket; authentication; mitigation; password theft; prevention; proof of identity; protection; single sign-on; vulnerability

Industrial espionage through complex cyber attacks such as Advanced Persistent Threats (APT) is an increasing risk in any business segment. Combining any available attack vector professional attackers infiltrate their targets progressively, e.g. through combining social engineering with technical hacking. The most relevant targets of APT are internal enterprise and production networks providing access to top-secret information. This work focuses on preventing Pass-the-Hash, one of the biggest and most long-standing security flaws present in enterprise domain networks. The introduced approach can be applied further to make password theft pointless for attackers in general, and is capable of extending network protocols, that are unprotected by themselves, with approved security mechanisms. T he protocols do not need to be modified and already existing network services can stay untouched when integrating the solution into enterprise infrastructures.