Overview
In this exercise, you'll use a captured hash to authenticate on a remote system without learning the password.
A captured hash
In this exercise, you'll use a captured hash to authenticate on a remote system without learning the password.
A captured hash