header bg

Scan QR code or get instant email to install app


Which of the following types of attacks did Sam use in the case:
He used malware to get access to Sally's PC on the network. He has discovered information that would enable him to leverage the underlying NTLM to raise his privileges without the requirement for the plaintext password.

A Pass the hash

Related Information


Leave a Reply

Your email address will not be published. Required fields are marked *