Pass-The-Hash: How Attackers Spread And How To Stop Them