Return to search

Využití útoku "Pass the hash attack" na kompromitaci vysoce privilegovaných účtů / Using of the attack "Pass the hash attack" for the compromising of high privileged accounts.

The master thesis deals with the attack "‘pass the hash"’ on high privileged accounts. Within the theoretical part is discussed creating hashes and its use. Next is a descrip- tion of the authentication in Windows operating system. There are also pointed out weaknesses in the design of authentication mechanisms. The last part deals with the individual attack and security options for mitigating the impacts. In the practical part are tested available tools for retrieving hashes from the files of the operating systems and tools which allow the attack itself. The output of this section is selection of the appropriate tools to demonstrate the attack in a proposed real environ- ment. The last topic is about designing the experimental environment, demostration of the attack with the possibility of getting through the network. The last steps deal with mitigating the impact of the attack.

Identiferoai:union.ndltd.org:nusl.cz/oai:invenio.nusl.cz:220613
Date January 2014
CreatorsJakab, Vojtěch
ContributorsRosenberg, Martin, Babnič, Patrik
PublisherVysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií
Source SetsCzech ETDs
LanguageCzech
Detected LanguageEnglish
Typeinfo:eu-repo/semantics/masterThesis
Rightsinfo:eu-repo/semantics/restrictedAccess

Page generated in 0.0027 seconds