• English
  • Deutsch
  • Log In
    or
  • Research Outputs
  • Projects
  • Researchers
  • Institutes
  • Statistics
Repository logo
Fraunhofer-Gesellschaft
  1. Home
  2. Fraunhofer-Gesellschaft
  3. Konferenzschrift
  4. Preventing pass-the-hash and similar impersonation attacks in enterprise infrastructures
 
  • Details
  • Full
Options
2016
Conference Paper
Titel

Preventing pass-the-hash and similar impersonation attacks in enterprise infrastructures

Alternative
Preventing pass-the-hash and similar identity replays in enterprise infrastructures
Abstract
Industrial espionage through complex cyber attacks such as Advanced Persistent Threats (APT) is an increasing risk in any business segment. Combining any available attack vector professional attackers infiltrate their targets progressively, e.g. through combining social engineering with technical hacking. The most relevant targets of APT are internal enterprise and production networks providing access to top-secret information. This work focuses on preventing Pass-the-Hash, one of the biggest and most long-standing security flaws present in enterprise domain networks. The introduced approach can be applied further to make password theft pointless for attackers in general, and is capable of extending network protocols, that are unprotected by themselves, with approved security mechanisms. T he protocols do not need to be modified and already existing network services can stay untouched when integrating the solution into enterprise infrastructures.
Author(s)
Oberle, Alexander
Larbig, Pedro
Marx, Ronald
Weber, Frank G.
Scheuermann, Dirk
Fages, Daniel
Thomas, Fabien
Hauptwerk
IEEE 30th International Conference on Advanced Information Networking and Applications, AINA 2016. Proceedings
Konferenz
International Conference on Advanced Information Networking and Applications (AINA) 2016
DOI
10.1109/AINA.2016.101
File(s)
N-396066.pdf (508.73 KB)
Language
English
google-scholar
Fraunhofer-Institut für Sichere Informationstechnologie SIT
Tags
  • APT

  • enterprise security

  • Pass-the-Hash

  • Pass-the-Ticket

  • authentication

  • mitigation

  • password theft

  • prevention

  • proof of identity

  • protection

  • single sign-on

  • vulnerability

  • Cookie settings
  • Imprint
  • Privacy policy
  • Api
  • Send Feedback
© 2022