John works as a professional Ethical Hacker. He has been assigned the project of testing the
security of www.we-are-secure.com. He has successfully completed the following pre-attack
phases while testing the security of the server:
Footprinting
Scanning
Now he wants to conduct the enumeration phase.
Which of the following tools can John use to conduct it?
Each correct answer represents a complete solution. Choose all that apply.
A.
PsFile
B.
PsPasswd
C.
WinSSLMiM
D.
UserInfo
Explanation: