Pass-the-Hash: How Attackers Spread and How to Stop Them