A security analyst has been asked to investigate a situation after the SOC started to receive alerts from the SIEM.
The analyst first looks at the domain controller and finds the following events:
To better understand what is going on, the analyst runs a command and receives the following output:
Based on the analyst's findings, which of the following attacks is being executed?
A.
Credential harvesting B.
Keylogger C.
Brute-force D.
Spraying.
D.
A security analyst has been asked to investigate a situation after the SOC started to receive alerts from the SIEM.
The analyst first looks at the domain controller and finds the following events:
To better understand what is going on, the analyst runs a command and receives the following output:
Based on the analyst's findings, which of the following attacks is being executed?
A.
Credential harvesting
B.
Keylogger
C.
Brute-force
D.
Spraying.
D.