A large enterprise's internal user database was recently hacked and leaked onto the internet. While working for a security consultancy you have found evidence that several user's accounts were accessed using their password. You believe the hackers are using an existing set of common passwords to determine which users hashed passwords match. What type of attack was used to determine the user's hashed passwords?
Rainbow table
Hash Reversal
Brute-force
Dictionary