A file contains several hashes. Which of the following can be used in a pass-the-hash attack?
A. NTLMv2
B. Kerberos
C. NTLMv1
D. LMv2
E. NTLM
A file contains several hashes. Which of the following can be used in a pass-the-hash attack?
A. NTLMv2
B. Kerberos
C. NTLMv1
D. LMv2
E. NTLM