Log in
Enquire now
‌

US Patent 11916953 Method and mechanism for detection of pass-the-hash attacks

Patent 11916953 was granted and assigned to Cybereason on February, 2024 by the United States Patent and Trademark Office.

OverviewStructured DataIssuesContributors

Contents

Is a
Patent
Patent
0

Patent attributes

Patent Applicant
Cybereason
Cybereason
0
Current Assignee
Cybereason
Cybereason
0
Patent Jurisdiction
United States Patent and Trademark Office
United States Patent and Trademark Office
0
Patent Number
119169530
Patent Inventor Names
Phillip Tsukerman0
Date of Patent
February 27, 2024
0
Patent Application Number
165792150
Date Filed
September 23, 2019
0
Patent Citations
‌
US Patent 11038876 Managing access to services based on fingerprint matching
0
‌
US Patent 10135830 Utilizing transport layer security (TLS) fingerprints to determine agents and operating systems
0
‌
US Patent 10375095 Modeling behavior in a network using event logs
0
‌
US Patent 10931686 Detection of automated requests using session identifiers
0
Patent Primary Examiner
‌
Christopher C Harris
0
Patent abstract

A method of generating a baseline of expected behavior on a single machine or endpoint to accurately fingerprint the native behavior of the NTLM protocol on that particular endpoint in a network. By limiting the scope of a baseline to a single endpoint, the scope of the baseline can consist of expected behavior (including supported hash functions, version strings and various feature flags). Deviations from these behaviors are considered evidence of a redundant implementation of NTLM utilized by an attacker and thus as evidence of an attempted PTH attack. Using this method it is possible to accurately detect PTH attacks originating from all publicly known non-standard implementations of NTLM existing in tools such as Impacket, Metasploit, and Invoke-TheHash.

Timeline

No Timeline data yet.

Further Resources

Title
Author
Link
Type
Date
No Further Resources data yet.

References

Find more entities like US Patent 11916953 Method and mechanism for detection of pass-the-hash attacks

Use the Golden Query Tool to find similar entities by any field in the Knowledge Graph, including industry, location, and more.
Open Query Tool
Access by API
Golden Query Tool
Golden logo

Company

  • Home
  • Press & Media
  • Blog
  • Careers
  • WE'RE HIRING

Products

  • Knowledge Graph
  • Query Tool
  • Data Requests
  • Knowledge Storage
  • API
  • Pricing
  • Enterprise
  • ChatGPT Plugin

Legal

  • Terms of Service
  • Enterprise Terms of Service
  • Privacy Policy

Help

  • Help center
  • API Documentation
  • Contact Us
By using this site, you agree to our Terms of Service.