Video upload date:  · Duration: PT1H46M27S  · Language: EN

Michael hired an attacker named Jimmy to eccouncil video

ethical-hacker video for michael hired an attacker named Jimmy to perform a few attacks on a competitor organization and gather sensitive information. In this

This is a dedicated watch page for a single video.

Full Certification Question

Michael hired an attacker named Jimmy to perform a few attacks on a competitor organization and gather sensitive information. In this process, Jimmy performed enumeration activities on the target organization’s systems to access the directory listings within Active Directory. What is the type of enumeration that Jimmy has performed in the above scenario?