A large enterprise's internal user database was recently hacked and leaked onto the internet. While working for a security consultancy you have found evidence that several user's accounts were accessed using their password. You believe the hackers are using an existing set of common passwords to determine which users hashed passwords match. What type of attach was used to determine the user's hashed passwords?
Operating Systems | |
Security | |
Software Troubleshooting | |
Operational Procedures |