Mary, a penetration tester, has found password hashes in a client system she managed to breach. She needs to use these passwords to continue with the test, but she does not have time to find the passwords that correspond to these hashes.
Which type of attack can she implement in order to continue?
a307962
12 months agoinsaniunt
1 year, 6 months agoIPconfig
1 year, 8 months agoVincent_Lu
2 years agovictorfs
2 years, 1 month agojeremy13
2 years, 2 months agoeli117
2 years, 2 months ago