A security analyst has been asked to investigate a situation after the SOC started to receive alerts from the SIEM.
The analyst first looks at the domain controller and finds the following events:
To better understand what is going on, the analyst runs a command and receives the following output:
Based on the analyst’s findings, which of the following attacks is being executed?
A . Credential harvesting
B . Keylogger
C . Brute-force
D . Spraying
Answer: D