John works as a professional Ethical Hacker. He has been assigned the project of testing the
security of www.we-are-secure.com. He has successfully completed the following pre-attack
phases while testing the security of the server:
· Footprinting
· Scanning
Now he wants to conduct the enumeration phase. Which of the following tools can John use to
conduct it?
Each correct answer represents a complete solution. Choose all that apply.
A.
PsFile
B.
UserInfo
C.
PsPasswd
D.
WinSSLMiM
Explanation: