Problem Statement
What is the difference between NTLM relay and pass the hash?
Explanation
In relay, the attacker sits in the middle and forwards the handshake to a target. In pass the hash, the attacker uses the NT L M hash as if it were the password. SMB signing, LDAP signing, and Kerberos only help reduce both risks.
Code Solution
SolutionRead Only
Mitigate: enforce SMB signing; restrict delegation; use Kerberos where possible
