Ricardo has discovered the username for an application in his target's environment. As he has a limited amount of time, he decides to attempt to use a list of common passwords he found on the Internet. He compiles them into a list and then feeds that list as an argument into his password-cracking application.
What type of attack is Ricardo performing?
Mdean
Highly Voted 2 years, 1 month agocalin2020
1 year, 11 months agoyaboyb
2 years, 1 month agoDaniel8660
Most Recent 8 months, 3 weeks agocehtaker
1 year, 5 months agovenera
1 year, 6 months agoProveCert
1 year, 6 months agosanderman55
1 year, 9 months agoC40s
1 year, 7 months agojinjection
1 year, 9 months agoANDRESCB1988
1 year, 11 months agoCNisha
1 year, 11 months agobeowolf
2 years agoyaboyb
2 years, 1 month agoQuidProQuoo
2 years, 1 month agoQuidProQuoo
2 years, 1 month agoripple
2 years, 1 month agoorabeya
2 years, 1 month ago