A penetration tester runs the following command and obtains the output shown:
After preparing the penetration test report, the penetration tester runs the following commands:
rm -f 127.0.0.1.unshadow
rm -f .john/john.pot
Which of the following best explains why the penetration tester ran the last two commands?
Snagggggin
3 months ago