PKF O'Connor Davies Accountants and Advisors
PKF O'Connor Davies Accountants and Advisors

Insights

Need help getting started?

Contact Us
Click Here to Access Our COVID-19 Resource Center

Insights Center: 2025 Tax & Legislative Changes

Individuals, businesses and not-for-profit organizations are all affected by the new tax law – and we are ready to help. Start by staying informed; you’ll find our analyses of the new law’s many provisions here.

LEARN MORE

What if I told you that, in many cases, the length and complexity of your password is completely irrelevant? That the constant trainings, the ever-increasing minimum length requirement and those little “password strength” meters that tell you just how Strong! your password really is, are entirely useless? To hackers, there might be no difference between “Password123” and that 30-character pass phrase your IT department finally got you to start using. Sad and maybe even scary, isn’t it?

In our last entry, we covered the basics of authentication relay attacks and provided one example where these principles were used to execute a novel attack against a client environment. It should be obvious that execution of a relay attacks starts by gaining access to a set of network credentials.

Throughout the last few entries, we’ve covered the basics of authentication coercion and relay attacks, as well as some novel real-world edge cases exploited by our team that use these techniques. This time let’s start digging into what comes after the first successful relay attack on a client’s network.