Post Exploitation Using NetNTLM Downgrade Attacks