An authentication system that uses challenge and response was recently implemented on an organization's network, because the organization conducted an annual penetration test showing that testers were able to move laterally using authenticated credentials. Which attack method was MOST likely used to achieve this?
- Hash collision
- Pass the ticket
- Brute force
- Cross-Site Scripting (XSS)
Show Answer Next Question