Ahmed wants to attempt to bypass an application’s security. He is going to attempt this by
sending a hash of a password, one that he has previously retrieved, directly to the database that
processes logins for the application. What best describes this?
A. Rainbow table
B. Password cracking
C. Pass the hash
D. App cracking
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here