A penetration tester has obtained a list of password hashes from a compromised Windows machine. They want to recover the plaintext passwords as efficiently as possible by using a precomputed lookup table that maps hashes to passwords. Which type of attack is this?
-
A
Brute-force attack
-
B
Dictionary attack
-
C
Rainbow table attack
-
D
Pass-the-hash attack