Which technique uses a stolen or forged hash to gain access without decrypting the password?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which technique uses a stolen or forged hash to gain access without decrypting the password?

Explanation:
This question is about credential theft and authentication bypass using hashed credentials. In a pass-the-hash attack, the attacker obtains a password hash from a compromised system (such as NTLM/LM hashes on Windows) and then presents that hash to a remote service to authenticate. Since the authentication process accepts the hash as proof of identity, the attacker can access systems and often move laterally without ever decrypting the actual password. This makes the hash the usable credential, not the plaintext password, which is why no decryption is needed. Brute force would involve guessing passwords to recover the plaintext, which is different because it tries to reveal the actual password rather than use a stolen hash directly. A replay attack would reuse a valid authentication message or token, but not specifically rely on presenting a password hash to gain access in the way pass-the-hash does. A keylogger captures keystrokes to obtain credentials, but that still requires later use of the captured plaintext and doesn’t exploit authentication via a stolen hash to access other systems.

This question is about credential theft and authentication bypass using hashed credentials. In a pass-the-hash attack, the attacker obtains a password hash from a compromised system (such as NTLM/LM hashes on Windows) and then presents that hash to a remote service to authenticate. Since the authentication process accepts the hash as proof of identity, the attacker can access systems and often move laterally without ever decrypting the actual password. This makes the hash the usable credential, not the plaintext password, which is why no decryption is needed.

Brute force would involve guessing passwords to recover the plaintext, which is different because it tries to reveal the actual password rather than use a stolen hash directly. A replay attack would reuse a valid authentication message or token, but not specifically rely on presenting a password hash to gain access in the way pass-the-hash does. A keylogger captures keystrokes to obtain credentials, but that still requires later use of the captured plaintext and doesn’t exploit authentication via a stolen hash to access other systems.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy