A pass-the-hash attack is commonly used to:
A . modify DNS records to point to a different domain.
B . modify the IP address of the targeted computer.
C . execute java script to capture user credentials.
D . laterally move across the network.
Answer: D