PrepAway - Latest Free Exam Questions & Answers

In cryptanalysis and computer security, pass the hash is a hacking technique that allows an attacker to authen

In cryptanalysis and computer security, pass the hash is a hacking technique that allows an attacker to authenticate to a remote server/service by using the underlying NTLM and/or LanMan hash

of a users password, instead of requiring the associated plaintext password as is normally the case.

Metasploit Framework has a module for this technique: psexec. The psexec module is often used by penetration testers to obtain access to a given system wh

ose credentials are known. It was written by sysinternals and has been integrated within the framework. The penetration testers successfully gain access to a system through some exploit, use meterpreter to grab the passwords or other methods like fgdump, p

wdump, or cachedump and then utilize rainbowtables to crack those hash values.

Which of the following is true hash type and sort order that is used in the psexec modules smbpass option?

A. LM:NT

B. NTLM:LM

C. NT:LM

D. LM:NTLM

QUESTION


Leave a Reply