

If we do the reset first time and do the second with a delay attacker will have enough time again to make use of password history.īelow information is from following blog( ). However if we want to overcome with a already breached situation, we need to do it with two quick successive attempts right.

I do agree with your statement on resetting the password two times quickly will impact kerberos ticket already delivered.
