5-37.2 Authentication and Access Control Attacks Flashcards
1
Q
This post-exploitation attack exploits the use of hashed passwords
A
Pass the hash
2
Q
This type of capture requires access to a network traffic sniffer
A
Packet capture
3
Q
This form of brute force attack limits itself to well known words
A
Dictionary
4
Q
This attack exploits vulnerabilities or weaknesses in a system to gain unauthorized access to higher level privileges
A
Vertical Privilege Escalation
5
Q
Authentication system vulnerable to post-exploitation silver and golden ticket attacks
A
Kerberos