Hello, you are using an old browser that's unsafe and no longer supported. Please consider updating your browser to a newer version, or downloading a modern browser.

Pass-the-Hash | Training Camp
Global Accelerated Learning • Est. 1999
Glossary Term Pass-the-Hash

Training Camp • Cybersecurity Glossary

What is Pass-the-Hash?

Pass-the-Hash is a technique where an attacker uses the hashed password of a user to authenticate and gain unauthorized access to a computer or network.

Glossary > Pass-the-Hash

Understanding Pass-the-Hash

Pass-the-Hash is a common cyberattack method where an attacker captures hashed credentials from a compromised computer and uses them to authenticate to other systems without needing to know the original plaintext password. By using the stolen hashed credentials, the attacker can gain unauthorized access to other systems and networks.

Learn More About Pass-the-Hash:

Ready to Get Certified?

Turn knowledge into credentials. Browse our instructor-led cybersecurity courses.

View All Courses →