In the process of active service enumeration, a penetration tester identifies an SMTP daemon running on one of the target company's servers.
Which of the following actions would best enable the tester to perform phishing in a later stage of the assessment?
Etc_Shadow28000
9Â months, 3Â weeks ago041ba31
1Â year, 1Â month agooutnumber_gargle024
11Â months agoLiveLaughToasterBath
1Â year, 2Â months agoduckduckgooo
1Â year, 4Â months ago