CompTIA PenTest+ PT0-002 Practice Question
During a penetration testing engagement, a tester successfully exploited a workstation and now aims to move laterally within the network to gain access to a restricted area containing sensitive data. Which technique would BEST facilitate this lateral movement without raising immediate alarms?
Brute force
Trojan
Dictionary attacks
Pass the hash