An analyst is examining the logs for a web application's login form. They see thousands of failed logon attempts using various usernames and passwords. Internet research indicates that these credentials may have been compiled by combining account information from several recent data breaches.
Which type of attack would this be an example of?
Sheron
3 months agoSunny
3 months agoDulce
3 months agoBarney
4 months agoTerry
4 months agoShawnna
4 months agoGracia
4 months agoTarra
4 months agoErin
5 months agoJohana
5 months agoBarney
5 months agoPamella
5 months agoHermila
5 months agoRozella
5 months agoDelsie
1 year agoAlton
1 year agoFrancine
1 year agoAlpha
1 year agoLeota
1 year agoBettina
1 year agoDelmy
1 year agoFrederick
1 year agoVallie
1 year agoEmile
1 year agoSheron
1 year agoFelicitas
1 year agoTijuana
1 year agoRolf
1 year agoAlfred
1 year agoBarrett
1 year agoMary
1 year agoEugene
1 year agoHoa
1 year agoKathrine
1 year agoIdella
1 year agoDaniel
1 year ago