header bg

Scan QR code or get instant email to install app

Question:

Which of the following types of attacks did Sam use in the case:
He used malware to get access to Sally's PC on the network. He has discovered information that would enable him to leverage the underlying NTLM to raise his privileges without the requirement for the plaintext password.

A Pass the hash
explanation