A penetration tester managed to access an internal Windows workstation for a target company. The tester used Mimikatz during the post exploitation of this compromised host. Which of the following would be a relevant reason for the tester to use this tool?
Cimoooooo
1 week, 2 days ago