Multiple Choice
In which of the following scenarios would a tester perform a Kerberoasting attack?
A) The tester has compromised a Windows device and dumps the LSA secrets.
B) The tester needs to retrieve the SAM database and crack the password hashes.
C) The tester has compromised a limited-privilege user and needs to target other accounts for lateral movement.
D) The tester has compromised an account and needs to dump hashes and plaintext passwords from the system.
Correct Answer:

Verified
Correct Answer:
Verified
Q143: A senior employee received a suspicious email
Q144: Joe, an attacker, intends to transfer funds
Q145: A client is asking a penetration tester
Q146: Which of the following are MOST important
Q147: A penetration tester is reviewing a Zigbee
Q149: Which of the following can be used
Q150: A penetration tester has successfully deployed an
Q151: A client's systems administrator requests a copy
Q152: A consultant is attempting to harvest credentials
Q153: Which of the following vulnerabilities are MOST