ExamGecko
Question list
Search
Search

Related questions











Question 478 - 312-50v12 discussion

Report
Export

Mary, a penetration tester, has found password hashes in a client system she managed to breach.

She needs to use these passwords to continue with the test, but she does not have time to find the passwords that correspond to these hashes. Which type of attack can she implement in order to continue?

A.
LLMNR/NBT-NS poisoning
Answers
A.
LLMNR/NBT-NS poisoning
B.
Internal monologue attack
Answers
B.
Internal monologue attack
C.
Pass the ticket
Answers
C.
Pass the ticket
D.
Pass the hash
Answers
D.
Pass the hash
Suggested answer: D

Explanation:

Active Online Attacks: Hash Injection/Pass-the-Hash (PtH) Attack A hash injection/PtH attack allows an attacker to inject a compromised hash into a local session and use the hash to validate network resources The attacker finds and extracts a logged-on domain admin account hash The attacker uses the extracted hash to log on to the domain controller

asked 18/09/2024
Avinash Jindal
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first