Which of the following types of attacks did Sam use in the case: He used malware to get access to Sally's PC on the network. He has discovered information that would enable him to leverage the underlying NTLM to raise his privileges without the requirement for the plaintext password.