What level of protection does the secure remote password protocol provide against the Pass the Hash attack?
I have read a lot about the secure remote password, and in the Stanford “What is it?” page for Secure Remote Password (SRP) protocol, it talks about the SRP ability to defend against attackers that can:
“Attackers can eavesdrop on all communications between client and server.
Attackers can intercept, modify, and forge arbitrary messages between client and server.”
So does this mean that the Secure Remote Password protocol constitutes a good defense against the Pass the Hash attacks, and what additional measures need to be put in place to adequately defend against pass the hash attacks?