3-25.2 Post-Exploitation Attacks Flashcards
1
Q
Type of attack that requires a system to already be compromised
A
Post-exploitation
2
Q
Pass-the-Hash is considered this type of exploit
A
Credential Theft
3
Q
Cryptographic Mutual Authentication System
A
Kerberos
4
Q
This exploit results in access to any AD domain resource
A
Golden Ticket Attack
5
Q
This exploit occurs when an attacker gains access to a Kerberos Ticket-Granting Ticket (TGT)
A
Silver Ticket Attack