Kyle Belote

55%
Flag icon
In a pass the hash attack, the attacker discovers the hash of the user’s password and then uses it to log on to the system as the user.
CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide
Rate this book
Clear rating
Open Preview