Go the hash (PtH) is often a variety of attack where an adversary steals a “hashed” consumer credential and utilizes it to produce a new person session on the same network. As of now We have now thorough knowledge of how the cyber-attacks take place and which stage they continue, https://ieeexplore.ieee.org/document/9941250