https://www.optiv.com/blog/post-exploitation-using-netntlm-downgrade-attacks?lipi=urn%3Ali%3Apage%3Ad_flagship3_profile_view_base_recent_activity_details_all%3BPriWZuhESs2gNhrrNfejsw%3D%3D&licu=urn%3Ali%3Acontrol%3Ad_flagship3_profile_view_base_recent_activity_details_all-original_share_object