A client is asking a penetration tester to evaluate a new web application for availability. Which of the
following types of attacks should the tester use?
During a penetration test, a tester runs a phishing campaign and receives a shell from an internal PC
running Windows 10 OS. The tester wants to perform credential harvesting with Mimikazt. Which of the
following registry changes would allow for credential caching in memory?
Visit us at