Ricardo has discovered the username for an application in his target's environment. As he has a limited amount of time, he decides to attempt to use a list of common passwords he found on the Internet. He compiles them into a list and then feeds that list as an argument into his password-cracking application.
What type of attack is Ricardo performing?
Mdean
Highly Voted 1 year, 11 months agocalin2020
1 year, 9 months agoyaboyb
1 year, 11 months agoDaniel8660
Most Recent 6 months, 3 weeks agocehtaker
1 year, 3 months agovenera
1 year, 4 months agoProveCert
1 year, 4 months agosanderman55
1 year, 7 months agoC40s
1 year, 5 months agojinjection
1 year, 7 months agoANDRESCB1988
1 year, 9 months agoCNisha
1 year, 9 months agobeowolf
1 year, 10 months agoyaboyb
1 year, 11 months agoQuidProQuoo
1 year, 11 months agoQuidProQuoo
1 year, 11 months agoripple
1 year, 11 months agoorabeya
1 year, 11 months ago