Pre-Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 146 Topic 15 Discussion

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 146 Topic 15 Discussion

312-50v13 Exam Topic 15 Question 146 Discussion:
Question #: 146
Topic #: 15

During an internal assessment, a penetration tester gains access to a hash dump containing NTLM password hashes from a compromised Windows system. To crack the passwords efficiently, the tester uses a high-performance CPU setup with Hashcat, attempting millions of password combinations per second. Which technique is being optimized in this scenario?


A.

Spoof NetBIOS to impersonate a file server


B.

Leverage hardware acceleration for cracking speed


C.

Dump SAM contents for offline password retrieval


D.

Exploit dictionary rules with appended symbols


Get Premium 312-50v13 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.