Last Updated on August 13, 2021 by Admin 3
A security consultant is trying to attack a device with a previously identified user account.
Which of the following types of attacks is being executed?
- Credential dump attack
- DLL injection attack
- Reverse shell attack
- Pass the hash attack