Multiple Choice
Janet is reading about the "Pass-the-Hash" technique to access a Windows host. She thinks she can use Wireshark to sniff an SMB session between two hosts if she can capture the password hash and user name, and simply send them as credentials anytime she wants in a "Replay Attack".
What are other true statements about this attack? (Choose three)
A) This can also be done using a modified smbclient tool that does not hash an entered password, it will just directly send the hash that Janet captured
B) Janet can also use a tool such as smbrelay to become an SMB proxy and capture credentials that
Way
C) The traffic that Janet sniffed did not include a challenge, if it did the technique is still not impossible just involves more steps
D) Because Microsoft uses techniques such as SMB Signing, Kerberos Timestamps, and Challenges that are used to create unique MAC (Message Authentication Code) s. The Pass-the-hash technique is mostly a proof of concept that works in theory but not in practice.
Correct Answer:

Verified
Correct Answer:
Verified
Q1: You notice the following in your log
Q2: ARP spoofing can be used to perform
Q3: You have a website that is not
Q4: Which of the following tools are web
Q6: How many possible values can be generated
Q7: Jacob finds the following packet dump in
Q8: Keith is setting up a Wifi network
Q9: Baxter has been told he must install
Q10: When testing a website you enter the
Q11: When evaluating possible NIDS, you are concerned