In an unprotected network file repository, a penetration tester discovers a text file containing usernames and passwords in cleartext and a spreadsheet containing data for 50 employees, including full names, roles, and serial numbers. The tester realizes some of the passwords in the text file follow the format: <name- serial_number>. Which of the following would be the best action for the tester to take NEXT with this information?
ariel004
1 year agoshakevia463
2 years, 6 months agoshakevia463
2 years, 6 months agoshakevia463
2 years, 6 months agodavid124
3 years ago[Removed]
2 years, 11 months agoslizzy420
2 years, 11 months ago