ethical-hacker video for oliver, an ethical hacker, has discovered password hashes in a client system he successfully infiltrated. In order to proceed with the
Oliver, an ethical hacker, has discovered password hashes in a client system he successfully infiltrated. In order to proceed with the assessment, he must leverage these hashes without investing time in identifying the corresponding passwords. Which type of attack can Oliver employ to continue?