Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Question 8 Why would an attacker use Mimikatz when they gain access to a system? to extract passwords and hashes for user accounts that have

Question 8
Why would an attacker use Mimikatz when they gain access to a system?
to extract passwords and hashes for user accounts that have logged in to the system
to create a tunnel for covert communication channels back to the attacker network
to list the user accounts currently logged in to the machine
to create a new domain user account to log in to so regular users will not notice their activity

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database And Expert Systems Applications 24th International Conference Dexa 2013 Prague Czech Republic August 2013 Proceedings Part 1 Lncs 8055

Authors: Hendrik Decker ,Lenka Lhotska ,Sebastian Link ,Josef Basl ,A Min Tjoa

2013 Edition

3642402844, 978-3642402845

More Books

Students also viewed these Databases questions