Donald, a professional hacker, was eccouncil video
ethical-hacker video for donald, a professional hacker, was attempting to establish persistence on a compromised Windows system. For this purpose, he exploited
Answer
          Full Certification Question
Donald, a professional hacker, was attempting to establish persistence on a compromised Windows system. For this purpose, he exploited a security limitation within the NTLM protocol and obtained valid NTLM hashes of Kerberos tickets. Next, Donald reused the password hashes for gaining access to other network resources. Which of the following attacks did Donald launch in the above scenario?