A pentester shows a client how a cleartext password and other information can be extracted from system memory. Which tool does the pentester demonstrate?
a) Wireshark
b) John the Ripper
c) Metasploit
d) Volatility