Assuring two systems that are using IPSec to protect traffic over the internet, what type of general attack could compromise the data?
Why would you consider sending an email to an address that you know does not exist within the company you are performing a Penetration Test for?
How can you determine if an LM hash you extracted contains a password that is less than 8 characters long?