ethical-hacker video for a penetration tester is assessing a company's internal authentication mechanisms. During testing, they attempt to query user details
A penetration tester is assessing a company's internal authentication mechanisms. During testing, they attempt to query user details from the organization's directory service using anonymous access. They discover that usernames, email addresses, and department details are exposed due to misconfigured access controls. Which protocol is most likely being exploited?