- Threat Detection, Investigation, and Response (TDIR) Use Case Categories
- Threat Detection, Investigation, and Response (TDIR) Use Case Categories Hierarchy
- Compromised Insiders Use Case Category
- External Threats Use Case Category
- Malicious Insiders Use Case Category
PrevNext
Pass the Hash Scenario
Learn about the Lateral Movement Pass the Hash scenario.
The Pass the Hash scenario describes when an attacker uses stolen password hashes or the pass the hash technique to move laterally in an environment and bypass system access controls.
In the Threat Detection, Investigation, and Response (TDIR) Use Case Categories hierarchy, the Pass the Hash scenario falls under the Lateral Movement use case.