In an LLMNR-poisoning lab, a victim browses \\10.0.2.7
and your Kali box runs:
responder -I eth0 -wdv
You capture an NTLMv2 hash. Which follow-up is most aligned with the attack chain described?
Crack with hashcat -m 5600
using a wordlist
Replay the hash directly to RDP on any host
Convert the hash to Kerberos and use pass-the-ticket
Use -m 0
in hashcat because it’s “MD5 equivalent”
This question is part of this quiz :
Cyber Quiz Day 26