A pass-the-hash attack is commonly used to: