This is a dedicated watch page for a single video.
James, a certified hacker, targeted multiple user accounts of an organization’s work group to crack their passwords. In this process, he used a single commonly used password on multiple accounts simultaneously and waited for responses before initiating another password on the same accounts. This technique allowed James to attempt more passwords without being affected by automatic lockout mechanisms. Identify the type of password cracking attack performed by James in the above scenario.