Why do I need to crack the hashes I gather from Kerberoasting? What is the difference between a hash with which I can do a Pass The Hash attack, and one that can't?
[link] [comments]
from hacking: security in practice https://ift.tt/Nw8mvAi
Why do I need to crack the hashes I gather from Kerberoasting? What is the difference between a hash with which I can do a Pass The Hash attack, and one that can't?
Comments
Post a Comment