Cybersecurity
Penetration Testing
Mcq
Oct 16, 2025
Which technique allows attackers to move laterally through a network after initial compromise?
Detailed Explanation
Pass-the-hash attacks use captured password hashes to authenticate to other systems without knowing the actual password.
Discussion (0)
No comments yet. Be the first to share your thoughts!
Share Your Thoughts