Pre-Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 183 Topic 19 Discussion

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 183 Topic 19 Discussion

312-50v13 Exam Topic 19 Question 183 Discussion:
Question #: 183
Topic #: 19

A red team operator wants to obtain credentials from a Windows machine without touching LSASS memory due to security controls and Credential Guard. They use SSPI to generate NetNTLM responses in the logged-in user context and collect those responses for offline cracking. Which attack technique is being used?


A.

Internal Monologue attack technique executed through OS authentication protocol manipulations


B.

Replay attack attempt by reusing captured authentication traffic sequences


C.

Hash injection approach using credential hashes for authentication purposes


D.

Pass-the-ticket attack method involving forged tickets for network access


Get Premium 312-50v13 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.