In the process of active service enumeration, a penetration tester identifies an SMTP daemon running on one of the target company's servers. Which of the following actions would BEST enable the tester to perform phishing in a later stage of the assessment?
BinarySoldier
Highly Voted 3 years, 6 months agoRVP20
Highly Voted 3 years, 3 months agosome_specialist
Most Recent 3 years, 2 months ago