[1]陳書正,「前端資安事件自動化安全部署與營運管理」,健行科技大學,碩士論文,民國一百零四年。[2]黃冠龍,「以企業網路威脅模擬環境之實驗案例探討Windows雜湊傳遞Pass-the-Hash攻擊」,健行科技大學,碩士論文,民國一百零四年。[3]宋皓榮,「以企業網路威脅模擬環境之實驗案例探討Windows憑證傳遞Pass-the-Ticket攻擊」,健行科技大學,碩士論文,民國一百零四年。[4]Microsoft TechNet。2016。淺談 ( Pass the Hash ) PtH 與 PtT ( Pass the Ticket ) 攻擊對企業的衝擊(上)。TechNet Taiwan。網址:https://blogs.technet.microsoft.com/technet_taiwan/2016/03/29/pass-the-hash-pth-ptt-pass-the-ticket-2/#C。上網日期2017-07-21。
[5]Microsoft TechNet。2016。淺談 ( Pass the Hash ) PtH 與 PtT ( Pass the Ticket ) 攻擊對企業的衝擊(下)。TechNet Taiwan。網址: https://blogs.technet.microsoft.com/technet_taiwan/2016/04/13/pass-the-hash-pth-ptt-pass-the-ticket/。上網日期2017-07-21。
[6]Alex Harrell. 2016. The Active Directory Handbook – Everything You Need To Know About Active Directoy. 1st ed. USA: Emereo Publishing.
[7]Dobromir Todorov. 2007. Windows User Authentication Architecture.In Machanics of User Identification and Authentication – Fundamentals of Identity Management. 1st ed.,139-299. USA: Auerbach Publications.
[8]Eric M. Hutchins, Michael J. Cloppert, Rohan M. Amin, Ph.D. 2011. Intelligence-Driven Computer Network Defense. In:” Leading Issuse in Information Warfare & Security Research”. 80-106. eds.Dr. Julie Ryan.
[9]Sean T. Malone. 2016. Using an Expanded Kill Chain Model to Increase Attack Resiliency. Black Hat USA. Available at: www.blackhat.com/docs/us-16/materials/us-16-Malone-Using-An-Expanded-Cyber-Kill-Chain-Model-To-Increase-Attack-Resiliency.pdf. Accessed 21 July 2017.
[10]Panda Security. Understanding Cyber-Attacks. Available at: resources.pandasecurity.com/enterprise/solutions/ad360/1704-WHITEPAPER-CKC-EN.pdf. Accessed 21 July 2017.
[11]oVirt. Open-Source Virtualization Management Platform. Available at: www.ovirt.org. Accessed 21 July 2017.
[12]OpenStack. Open source software for creating private and public clouds. Available at: www.openstack.org. Accessed 21 July 2017.
[13]vCenter. VMware''s vCenter Server manages your virtual infrastructure from a single console with ease. Available at: www.vmware.com/products/vcenter-server.html. Accessed 21 July 2017.
[14]freeIPA. Identity, Policy, Trusts Security Management Solution. Available at: www.freeipa.org/page/Main_Page. Accessed 21 July 2017.
[15]Red Hat Identity Management Server. Introduction to Red Hat Identity Management. Available at: access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/Linux_Domain_Identity_Authentication_and_Policy_Guide/introduction.html. Accessed 21 July 2017.
[16]Root The Box. Real-time scoring engine for a computer wargames where hackers can practice and learn. Available at: root-the-box.com. Accessed 21 July 2017.
[17]VLAND. Broadcast Domain That is Partitioned and isolated in a Computer Network at the Data link layer (OSI layer 2). Available at: en.wikipedia.org/wiki/Virtual_LAN. Accessed 21 July 2017.
[18]SPICE. Provide Improved Remote Desktop Capabilities in a fork of the KVM Codebase. Available at: www.spice-space.org/index.html. Accessed 21 July 2017.
[19]RDP. Proprietary Protocol Developed by Microsoft. Available at: msdn.microsoft.com/en-us/library/aa383015(v=vs.85).aspx. Accessed 21 July 2017.
[20]M-Trends FireEye. A VIEW FROM THE FRONT LINES: Threat Report. M-Trends 2015. Report. Available at: www2.fireeye.com/rs/fireye/images/rpt-m-trends-2015.pdf. Accessed 21 July 2017.
[21]Centralized Network Security Management: Combining Defense in Depth with Manageable Security. SANS Institute InfoSec Reading Room. Available at: www.sans.org/reading-room/whitepapers/bestprac/centralized-network-security-management-combining-defense-in-depth-manageable-security-659. Accessed 21 July 2017.
[22]Hohnny L. Waddell. Basic Security Issues of Active Directory. SANS Institute InfoSec Reading Room. Available at: www.sans.org/reading-room/whitepapers/win2k/basic-security-issues-active-directory-191. Accessed 21 July 2017.
[23]Jonathan Gohstand. Getting the Most from Active Directory in the Enterprise. Enterprise System Journal (ESJ). Available at: esj.com/articles/2010/06/15/active-directory-in-the-enterprise.aspx. Accessed 21 July 2017.
[24]Isode Ltd. Why Deploy an Enterprise Directory?. Available at: www.isode.com/whitepapers/ic-6083.html. Accessed 21 July 2017.
[25]Karsten Brauer. Authentication and Security Aspects in an International Multi-user Network (Bachelor’s Thesis, USA). Bachelor’s Thesis, USA, Turku University of Applied Sciences. Available at: www.theseus.fi/bitstream/handle/10024/30738/Karsten_Brauer.pdf?sequence=1. Accessed 21 July 2017.
[26]Microsoft. Windows Authentication Services System Overview. MS-AUTHSO. Available at: download.microsoft.com/download/5/0/1/501ED102-E53F-4CE0-AA6B-B0F93629DDC6/Windows/[MS-AUTHSO].pdf. Accessed 21 July 2017.
[27]Ondrej Sevecek. Windows Authentication Concepts. GOPAS. Available at: www.sevecek.com/Presentations/GOC172/gopas-goc-172-01-Authentication-Concepts.pdf. Accessed 21 July 2017.
[28]Microsoft. Cached and Stored Credentials Technical Overview. Microsoft TechNet. Available at: technet.microsoft.com/en-us/library/hh994565 (v=ws.11).asp. Accessed 21 July 2017.
[29]Jim Mulder. Mimikatz Overview, Definses and Detection. SANS Institute InfoSec Reading Room. Available at: www.sans.org/reading-room/whitepapers/detection/mimikatz-overview-defenses-detection-36780. Accessed 21 July 2017.
[30]Joey Niem. Why Crack When You Can Pass the Hash?. SANS Institute InfoSec Reading Room. Available at: www.sans.org/reading-room/whitepapers/testing/crack-pass-hash-33219. Accessed 21 July 2017.
[31]Baris Saydag and Seth Moore. Defeating Pass-the-Hash (Whitepaper). BlackHat 2015. Available at: www.blackhat.com/docs/us-15/materials/us-15-Moore-Defeating%20Pass-the-Hash-Separation-Of-Powers-wp.pdf. Accessed 21 July 2017.
[32]NSA. Reducing the Effectiveness of Pass-the-Hash. National Security Agency/Central Security Service Information Assurance Directorate. Available at: www.iad.gov/iad/library/reports/reducing-the-effectiveness-of-pass-the-hash.cfm. Accessed 21 July 2017.
[33]Sean Metcalf. Red vs. Blue: Modern Active Directory Attacks & Defense. DerbyCon 2015. Available at: adsecurity.org/wp-content/uploads/2016/03/DerbyCon-2015-Metcalf-RedvsBlue-ADAttackAndDefense-Presented-Final.pdf. Accessed 21 July 2017.
[34]Bashar Edaida. Pass-the-hash attacks: Tools and Mitigation.SANS Institute InfoSec Reading Room. Available at: www.sans.org/reading-room/whitepapers/testing/pass-the-hash-attacks-tools-mitigation-33283. Accessed 21 July 2017.
[35]Miguel SORIA-MACHADO, Didzis ABOLINS,Ciprian BOLDEA, Krzysztof SOCHA. Kerberos Golden Ticket Protection.Whitepaper. Available at: cert.europa.eu/static/WhitePapers/UPDATED%20-%20CERT-EU_Security_Whitepaper_2014-007_Kerberos_Golden_Ticket_Protection_v1_4.pdf. Accessed 21 July 2017.
[36]M-Trends FireEye. A VIEW FROM THE FRONT LINES: Threat Report.M-Trends 2016.Report. Available at: www2.fireeye.com/rs/848-DID-242/images/M-trends-2016-EMEA.pdf. Accessed 21 July 2017.
[37]Microsoft. Mitigating Pass-the-Hash (PtH) Attacks and Other Credential Theft Techniques.Documents. Available at: download.microsoft.com/download/7/7/a/77abc5bd-8320-41af-863c-6ecfb10cb4b9/mitigating%20pass-the-hash%20 (pth)%20attacks%20and%20other%20credential%20theft%20techniques_english.pdf. Accessed 21 July 2017.
[38]Microsoft. Mitigating Pass-the-Hash and Other Credential Theft,version 2.Documents. Available at: download.microsoft.com/download/7/7/A/77ABC5BD-8320-41AF-863C-6ECFB10CB4B9/Mitigating-Pass-the-Hash-Attacks-and-Other-Credential-Theft-Version-2.pdf. Accessed 21 July 2017.
[39]Chris Martin. Detecting Lateral Movement From ‘Pass the Hash’ Attacks.Blog. Available at: logrhythm.com/blog/detecting-lateral-movement-from-pass-the-hash-attacks. Accessed 21 July 2017.
[40]Tim Rains. New Guidance to Mitigate Determined Adversaries’ Favorite Attack: Pass-the-Hash.Blog. Available at: blogs.microsoft.com/cybertrust/2012/12/11/new-guidance-to-mitigate-determined-adversaries-favorite-attack-pass-the-hash. Accessed 21 July 2017.
[41]Mark Russinovich and Nathan Ide. Pass-the-Hash: How Attackers Spread and How to Stop Them.RSACONFERENCE2014. Available at: www.rsaconference.com/writable/presentations/file_upload/hta-w03-pass-the-hash-how-attackers-spread-and-how-to-stop-them.pdf. Accessed 21 July 2017.
[42]Mark Russinovich and Nathan Ide. Pass-the-Hash II: How Attackers Spread and How to Stop Them. RSACONFERENCE2015. Available at: www.rsaconference.com/writable/presentations/file_upload/hta-r03-pass-the-hash_ii-the-wrath-of-hardware_final.pdf. Accessed 21 July 2017.
[43]Metasploit. Metasploit: Put your Defenses to the test. Available at: www.rapid7.com/products/metasploit. Accessed 21 July 2017.
[44]Benjamin Delpy. Unofficial Guide to Mimikatz & Command Reference. Available at: adsecurity.org/?page_id=1821. Accessed 21 July 2017.
[45]Mimikatz. Overpass-the-hash.Blog. Available at: blog.gentilkiwi.com. Accessed 21 July 2017.
[46]Jim Mulder. Mimikatz Overview, Definses and Detection.SANS Institute InfoSec Reading Room. Available at: www.sans.org/reading-room/whitepapers/detection/mimikatz-overview-defenses-detection-36780. Accessed 21 July 2017.
[47]ATT&CK. Adversarial Tactics, Techniques & Common Knowledge. Available at: attack.mitre.org/wiki/Main_Page. Accessed 21 July 2017.
[48]Abductive reasoning. a form of logical inference. Available at: en.wikipedia.org/wiki/Abductive_reasoning. Accessed 21 July 2017.
[49]Cyberbit Range. The most widely deployed cybersecurity training and simulation platform. Available at: www.cyberbit.com/solutions/cyber-range. Accessed 21 July 2017.