List of questions
Related questions
Question 31 - PT0-003 discussion
During an assessment, a penetration tester obtains an NTLM hash from a legacy Windows machine. Which of the following tools should the penetration tester use to continue the attack?
A.
Responder
B.
Hydra
C.
BloodHound
D.
CrackMapExec
Your answer:
0 comments
Sorted by
Leave a comment first