An auditor is reviewing the following output from a password-cracking tool: user:1: Passwordl user2: Recovery! user3: Alaskan10 user4: 4Private user5: PerForMance2
Which of the following methods did the author MOST likely use?
A. Hybrid
B. Dictionary
C. Brute force
D. Rainbow table