Which attack is a post-exploitation activity that an attacker uses to extract service account credential hashes from Active Directory for offline cracking?

IT Questions BankCategory: Ethical HackerWhich attack is a post-exploitation activity that an attacker uses to extract service account credential hashes from Active Directory for offline cracking?

Which attack is a post-exploitation activity that an attacker uses to extract service account credential hashes from Active Directory for offline cracking?

  • MITM
  • On-Path attack
  • MAC spoofing
  • Kerberoasting

Explanation: Kerberoasting is a post-exploitation activity used by an attacker to extract service account credential hashes from Active Directory for offline cracking. It is a pervasive attack that exploits a combination of weak encryption implementations and improper password practices.

Exam with this question: 5.3.3 Quiz - Exploiting Wired and Wireless Networks Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x