Want to create an interactive transcript for this episode?
Podcast: InfosecTrain
Episode: What is a Pass-the-Hash Attack (PtH)? | Pass the hash (PtH) attacks: How they work