A computer science student needs to fill some information into a secured Adobe PDF job application that was received from a prospective employer. Instead of requesting a new document that allowed the forms to be completed, the student decides to write a script that pulls passwords from a list of commonly used passwords to try against the secured PDF until the correct password is found or the list is exhausted. Which cryptography attack is the student attempting?
Daniel8660
6 months, 3 weeks agodinonino
7 months, 3 weeks agoANDRESCB1988
1 year, 9 months ago