An authentication system that uses challenge and response was recently implemented on an organization's network, because the organization conducted an annual penetration test showing that testers were able to move laterally using authenticated credentials. Which attack method was MOST likely used to achieve this?
Bach1968
Highly Voted 9Â months, 2Â weeks agoBigITGuy
Most Recent 2Â weeks, 2Â days agoHughJassole
10Â months agoDapengZhang
1Â year, 1Â month agoJ_Ko
2Â weeks, 2Â days agojackdryan
11Â months, 1Â week agosomkiatr
1Â year, 3Â months agosomkiatr
1Â year, 3Â months agoJ_Ko
2Â weeks, 2Â days agojbell
12Â months agosec_007
1Â year, 5Â months agofranbarpro
1Â year, 6Â months agokptest12
1Â year, 6Â months agoJamati
1Â year, 5Â months ago