کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
484261 703257 2016 10 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Implementation and Mitigation of Various Tools for Pass the Hash Attack
ترجمه فارسی عنوان
پیاده سازی و تعدیل ابزارهای مختلف برای ردیابی حمله هش
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر علوم کامپیوتر (عمومی)
چکیده انگلیسی

Advances in computing technology is acquainting numerous colossal changes with individuals’ way of life and working example as of late for its countless advantages. In any case, the security of cloud computing and server level technologies is dependably the center of various potential clients, and a major obstruction for its far-reaching applications. This paper introduces a novel approach of testing various tools that can be used to measure the potential helplessness of a digital system to particular sorts of assaults that uses lateral movement and privileged heightening, such as Pass The Hash. Earlier papers have only done the comparison at limited resources and have failed to show accurate result. While other papers and assets concentrate fundamentally on running the tools and in some cases contrasting them, this paper offers a top to bottom, orderly examination of the apparatuses over the different Windows stages, including AV discovery rates. It additionally gives broad counsel to moderate pass the hash assaults and talks about the upsides and downsides of a portion of the methodologies.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Procedia Computer Science - Volume 79, 2016, Pages 755-764