Now, consider an alternate scenario. What if when we manually establish a connection to the host who has the resource we would like to access, but rather than feeding it our unprivileged username and password we feed it the Administrator username and that administrators hash that we have stolen? What we have done is just gained administrative access to that host . Remember, all that the host is concerned about is receiving a hash that matches what it is expecting. This means that you don’t have to perform the one-way hashing function on the password, you just have to supply the hash, which is the basis for this attack.