What two ways does the pass-the-hash attack allow an attacker to gain access to workstations, servers, and key services?

In what two ways does the pass-the-hash attack allow an attacker to gain access to workstations, servers, and key services? (Choose two.)
A. Servers use the passed hash directly rather than computing a local version of the same password to make password hashing more efficient.
B. These attacks allow attackers to take advantage of other systems’ horizontal acknowledgment of user permissions without requiring re-authentication.
C. Many systems will accept a hash of the user password allowing the captured hash to be used for authentication.
D. All systems store passwords as hashes which can be interchanged among systems regardless of hashing algorithm.
E. All hash technologies have been reversed with publicly available rainbow tables for all hashes, giving attackers an easy ability to reverse any hash.

cisco-exams

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.