This is a dedicated watch page for a single video.
Michael hired an attacker named Jimmy to perform a few attacks on a competitor organization and gather sensitive information. In this process, Jimmy performed enumeration activities on the target organization’s systems to access the directory listings within Active Directory. What is the type of enumeration that Jimmy has performed in the above scenario?