In the C.I Flaw scenario, how can the attacker propagate into the domain network from the Jump Server in the DMZ network?

We can try to get the hash of the compromised machine and using it to login to one of the domain machines.
We can use the same credentials to connect to a domain machine.
We can't propagate into the domain network.
We can use the RDP shortcut found on the compromised machine.
Verified Answer
Correct Option - d

To get all Infosys Certified Offensive Security Professional Exam questions Join Telegram Group https://rebrand.ly/lex-telegram-236dee

Telegram