An authentication system that uses challenge and response was recently implemented on an organization's network, because the organization conducted an annual penetration test showing that testers were able to move laterally using authenticated credentials. Which attack method was MOST likely used to achieve this?
Bach1968
Highly Voted 10Â months, 1Â week agoBigITGuy
Most Recent 1Â month, 1Â week agoHughJassole
10Â months, 3Â weeks agoDapengZhang
1Â year, 1Â month agoJ_Ko
1Â month, 1Â week agojackdryan
1Â year agosomkiatr
1Â year, 4Â months agosomkiatr
1Â year, 4Â months agoJ_Ko
1Â month, 1Â week agojbell
1Â year agosec_007
1Â year, 6Â months agofranbarpro
1Â year, 7Â months agokptest12
1Â year, 7Â months agoJamati
1Â year, 6Â months ago