During a penetration testing engagement, a tester successfully exploited a workstation and now aims to move laterally within the network to gain access to a restricted area containing sensitive data. Which technique would BEST facilitate this lateral movement without raising immediate alarms?
Dictionary attacks
Trojan
Pass the hash
Brute force