Which of the following tools can John use to conduct it?

John works as a professional Ethical Hacker. He has been assigned the project of testing the
security of www.we-are-secure.com. He has successfully completed the following pre-attack
phases while testing the security of the server:
· Footprinting
· Scanning
Now he wants to conduct the enumeration phase. Which of the following tools can John use to
conduct it?
Each correct answer represents a complete solution. Choose all that apply.

John works as a professional Ethical Hacker. He has been assigned the project of testing the
security of www.we-are-secure.com. He has successfully completed the following pre-attack
phases while testing the security of the server:
· Footprinting
· Scanning
Now he wants to conduct the enumeration phase. Which of the following tools can John use to
conduct it?
Each correct answer represents a complete solution. Choose all that apply.

A.
PsFile

B.
UserInfo

C.
PsPasswd

D.
WinSSLMiM

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *