During a penetration testing engagement, a tester successfully exploited a workstation and now aims to move laterally within the network to gain access to a restricted area containing sensitive data. Which technique would BEST facilitate this lateral movement without raising immediate alarms?
The correct answer is 'Pass the hash', as this technique allows an attacker to authenticate to a remote server or service using the underlying NTLM or LAN Manager hash of a user's password, bypassing the need for the plain text password. This method is less noisy than brute force attacks, reducing the risk of detection, and is effective in networks where password hashes are reusable. 'Brute force' would be noisy and likely to trigger account lockouts or alerts. While 'Trojan' could help maintain access or exfiltrate data, it does not inherently facilitate lateral movement. 'Dictionary attacks' are similar to brute force in their likelihood of detection and do not specifically apply to the context of leveraging existing credentials for moving laterally.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Pass the Hash?
Open an interactive chat with Bash
Why is Pass the Hash considered less noisy than other techniques?