A security analyst needs to determine how an attacker was able to use User3 to gain a foothold within a company’s network. The company's lockout policy requires that an account be locked out for a minimum of 15 minutes after three unsuccessful attempts. While reviewing the log files, the analyst discovers the following:
Which of the following attacks MOST likely occurred?
sujon_london
Highly Voted 1 year, 8 months agoAlcpt
7 months agofrancuza
1 year, 1 month agoWinEH
1 year, 6 months agoTM78
Highly Voted 1 year, 2 months agoKen_Kaniff
9 months, 1 week agoxBrynlee
Most Recent 10 months, 1 week agoAn381038
11 months, 2 weeks agoMimikatz4Exam
11 months, 3 weeks ago9e20f4f
11 months, 4 weeks agoAspiringNerd
12 months agospearous
12 months agorussian
1 year agogab2024
1 year, 1 month agoNetworkTester1235
1 year agoxihjr
1 year, 1 month agops1hacker
1 year, 1 month agoBenrosan
1 year, 2 months agoMortG7
1 year, 3 months agoLummyD
1 year, 4 months agoMr_Tttt
1 year, 5 months ago[Removed]
1 year, 5 months ago