An authentication system that uses challenge and response was recently implemented on an organization's network, because the organization conducted an annual penetration test showing that testers were able to move laterally using authenticated credentials. Which attack method was MOST likely used to achieve this?
Bach1968
9Â months, 3Â weeks agoHughJassole
10Â months, 1Â week agoDapengZhang
1Â year, 1Â month agojackdryan
11Â months, 2Â weeks agosomkiatr
1Â year, 4Â months agojbell
1Â year agosomkiatr
1Â year, 4Â months agosec_007
1Â year, 6Â months agofranbarpro
1Â year, 6Â months agokptest12
1Â year, 6Â months agoJamati
1Â year, 5Â months ago