Attack Tutorial: How a Pass the Hash Attack Works