Johnson is a professional hacker who targeted an organization's customers and decided to crack their system passwords. In this process, he found a list of valid customers, created a list of possible passwords, ranked the passwords from high to low probability, and started keying in each password in the target system until the correct password is discovered.
Identify the type of attack performed by Johnson in the above scenario.
Johanna
5 months agoRoyal
5 months agoCaitlin
6 months agoAn
6 months agoFelix
6 months agoRebecka
6 months agoKeva
6 months agoJenelle
6 months agoNovella
6 months agoCassie
6 months agoEleonora
6 months agoDelmy
11 months agoLili
10 months agoJulio
11 months agoHeike
11 months agoWilda
12 months agoTracey
11 months agoCorazon
11 months agoChu
1 year agoLeota
11 months agoGiovanna
11 months agoOtis
11 months agoElliott
11 months agoSelma
1 year agoHerman
1 year agoDelfina
1 year agoLynelle
1 year agoJani
1 year ago