What is a common starting point for black-box exploitation of an Active Directory domain?

Question #

1/25

Score

0/0 - 0.0 %