List of questions
Related questions
Question 478 - 312-50v12 discussion
Mary, a penetration tester, has found password hashes in a client system she managed to breach.
She needs to use these passwords to continue with the test, but she does not have time to find the passwords that correspond to these hashes. Which type of attack can she implement in order to continue?
A.
LLMNR/NBT-NS poisoning
B.
Internal monologue attack
C.
Pass the ticket
D.
Pass the hash
Your answer:
0 comments
Sorted by
Leave a comment first