HACK STEPS (continued)
■
If passwords demonstrate a pattern that can be correlated with user-
names, you can try to log in using known or guessed usernames and the
corresponding inferred passwords.
■
Otherwise, you can use the list of inferred passwords as the basis for a
Do'stlaringiz bilan baham: