A red team gained access to the internal network of a client during an engagement and used the Responder tool to capture important data.
Which of the following was captured by the testing team?
A . Multiple handshakes
B . IP addresses
C . Encrypted file transfers
D . User hashes sent over SMB