February 17, 2015February 16, 2015 Michael J. Melone Understanding and Preventing Pass the Hash Attacks