A corporation hired an ethical hacker to test if it is possible to obtain users’ login credentials using
methods other than social engineering. Access to offices and to a network node is granted.
Results from server scanning indicate all are adequately patched and physical access is denied,
thus, administrators have access only through Remote Desktop. Which technique could be used
to obtain login credentials?
A.
Capture every users’ traffic with Ettercap.
B.
Capture LANMAN Hashes and crack them with LC6.
C.
Guess passwords using Medusa or Hydra against a network service.
D.
Capture administrators RDP traffic and decode it with Cain and Abel.