Johnson is a professional hacker who targeted an organization's customers and decided to crack their system passwords. In this process, he found a list of valid customers, created a list of possible passwords, ranked the passwords from high to low probability, and started keying in each password in the target system until the correct password is discovered.
Identify the type of attack performed by Johnson in the above scenario.
Delmy
2 months agoLili
14 days agoJulio
27 days agoHeike
28 days agoWilda
2 months agoTracey
2 months agoCorazon
2 months agoChu
2 months agoLeota
1 months agoGiovanna
2 months agoOtis
2 months agoElliott
2 months agoSelma
2 months agoHerman
2 months agoDelfina
2 months agoLynelle
3 months agoJani
3 months ago