3-25.2 Post-Exploitation Attacks Flashcards

1
Q

Type of attack that requires a system to already be compromised

A

Post-exploitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Pass-the-Hash is considered this type of exploit

A

Credential Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cryptographic Mutual Authentication System

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This exploit results in access to any AD domain resource

A

Golden Ticket Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This exploit occurs when an attacker gains access to a Kerberos Ticket-Granting Ticket (TGT)

A

Silver Ticket Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly