Why can't you PTH hashes from Kerberoast?

Why do I need to crack the hashes I gather from Kerberoasting? What is the difference between a hash with which I can do a Pass The Hash attack, and one that can't?

submitted by /u/kappadoky
[link] [comments]

from hacking: security in practice https://ift.tt/Nw8mvAi

Comments