8.1.15 Practice Questions

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following includes all possible characters or values for plaintext? Answers: Chain_num Chain_len Table_index Charset

AnswerCorrect Answer: Charset Explanation: The charset includes all possible characters for the plaintext. For example, loweralpha-numeric is defined in charset.txt as [abcdefghijklmnopqrstuvwxyz0123456789]. The table_index parameter selects the reduction function. Rainbow tables with different table_index parameters use different reduction function. Chain_num is the number of rainbow chains to generate. Rainbow table is simply an array of rainbow chains. The size of each rainbow chain is 16 bytes. Chain_len is the rainbow chain length. A longer rainbow chain stores more plaintexts and requires more time to generate.

[ !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~] are the possible values in which of the following hash types? Answers: Ascii-32-65-123-4 Mix alpha-numeric Ascii-32-95 Alpha-numeric-symbol32-space

Correct Answer: Ascii-32-95 Explanation: Ascii-32-95 characters can be any of the following: [ !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~] Ascii-32-65-123-4 characters can be any of the following: [ !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`{|}~] Alpha-numeric-symbol32-space characters can be any of the following: [ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789!@#$%^&*()-_+=~`[]{}|\:;"'<>,.?/] Mix alpha-numeric characters can be any of the following: [abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789]

You are cleaning your desk at work. You toss several stacks of paper in the trash, including a sticky note with your password written on it. Which of the following types of non-technical password attacks have you enabled? Answers: -Dumpster diving -Shoulder surfing -Password guessing -Social engineering

Correct Answer: Dumpster diving Explanation: Dumpster diving relies on finding sensitive information that has been discarded in garbage cans, dumpsters, or other unsecure places that create access for attackers. Shoulder surfing is watching and recording a password, pin, or access code that is being entered by someone nearby. Social engineering relies on human error. It works by feigning trustworthiness to convince someone to give the attacker access. Password guessing happens when someone is able to easily guess a password, typically because it is very common, like a pet's name or a hobby.

Sam has used malware to access Sally's computer on the network. He has found information that will allow him to use the underlying NTLM to escalate his privileges without needing the plaintext password. Which of the following types of attacks did he use? Answers: Pass the hash Rainbow attack Password sniffing Dictionary attack

Correct Answer: Pass the hash Explanation: Pass the hash is a hacking technique where an attacker uses an underlying NTLM or hash of a user's password to gain access to a server without ever using the actual plaintext password. In a dictionary attack, word lists often taken straight from dictionaries are tested against password databases. Password sniffing is a passive way for attackers to gain access to account. The sniffer collects data that is in transit in a LAN. If access is gained on one system in a LAN, the attacker can gather information being sent from any other system in the network. Rainbow attacks are similar to dictionary attacks. Instead of endlessly testing dictionary lists, this method uses tables that are precomputed with word lists and their hashes.

Which of the following techniques involves adding random bits of data to a password before it is stored as a hash? Answers: Pass the hash Keylogging Password sniffing Password salting

Correct Answer: Password salting Explanation: Password salting is adding random bits of data to a password before it is stored as a hash, making password cracking much more difficult. Password sniffing is a passive way for attackers to gain access to account. The sniffer collects data that is in transit in a LAN. Pass the hash is a hacking technique where an attacker uses an underlying NTML or hash of a user's password to gain access to a server without ever using the actual plaintext password. Keylogging is recording every stroke on the computer keyboard.

You are using a password attack that tests every possible keystroke for each single key in a password until the correct one is found. Which of the following technical password attacks are you using? Answers: Keylogger Brute force Password sniffing Pass the hash

Correct Answer: Brute force Explanation In a brute force attack, every password will eventually be found because its technique is to test every possible keystroke for each single key in a password until the correct one is found. Keyloggers log or record every keystroke on the computer keyboard to obtain passwords and other important data. Pass the hash is a hacking technique where an attacker uses an underlying NTLM or hash of a user's password to gain access to a server without ever using the actual plaintext password. Password sniffing is a passive way for attackers to gain access to an account. The sniffer collects data that is in transit in a LAN. If access is gained on one system in a LAN, then data can be gathered from data being sent from any other system in the network. The sniffer runs in the background, making it undetectable.

Which of the following best describes shoulder surfing? Answers: -Finding someone's password in the trash can and using it to access their account. -Giving someone you trust your username and account password. -Guessing someone's password because it is so common or simple. -Someone nearby watches you enter your password on your computer and records it.

Correct Answer: Someone nearby watches you enter your password on your computer and records it. Explanation: Shoulder surfing is watching and recording a password, pin, or access code that is being entered by someone nearby. Password guessing happens when someone is able to easily guess a password, typically because it is very common, like "password", their pet's name, or their hobby. Dumpster diving relies on finding sensitive information that has been discarded in garbage cans, dumpsters, or other unsecure places that create access for attackers. Social engineering relies on human error. It works by convincing someone to give the attacker access because they trick them into trusting them.

Jack is tasked with testing the password strength for the users of an organization. He has limited time and storage space. Which of the following would be the best password attack for him to choose? Answers: Brute force attack Keylogger attack Dictionary attack Rainbow attack

Correct Answer: Rainbow attack Explanation Rainbow attacks are like dictionary attacks, but instead of endlessly testing dictionary lists, they use tables that are precomputed with word lists and their hashes. This is much quicker than a dictionary attack or a brute-force attack and has much lower storage requirements. In a dictionary attack, word lists often taken straight from dictionaries are tested against password databases. Beside all the standard words you find in a dictionary, these lists usually include variations on words that are common for passwords, like using the word "pa$$word". Lists can also include simple keyboard finger rolls, like q-w-e-r-t1234. The downside to this attack is this process can take a very long time. In a brute force attack, every possible keystroke is tested for each single key in a password until the correct one is found. The disadvantages of this type of attack are that it takes a huge amount of processing power to execute and it is very time consuming. Keyloggers record every stroke on the computer keyboard, but must either be installed manually on each computer with the hardware option, or every user will have to open an email attachment to install the software option. Both processes are very time consuming.

You have just run the John the Ripper command shown below. Which of the following was this command used for? Command: zip2john secure.zip > secure.txt Answers: -To extract the password and save it in the secure.txt file. -To extract the password hashes and save them in the secure.txt file. -To extract the password from a rainbow hash and save it in the secure.txt file. -To extract the password and save it in a rainbow table named secure.txt.

Correct Answer: To extract the password hashes and save them in the secure.txt file. Explanation: The zip2john command is used to extract the password hashes from a zip file. Using the > output redirect operator saves the output to the specified file which is secure.txt in this case. After the hashes have been saved, you could run john --format=pkzip secure.txt to crack the password.

Listen to exam instructions You have created and sorted an md5 rainbow crack table. You want to crack the password. Which of the following commands would you use to crack a single hash? Answers: rcrack . -l /root/hashes.txt rtgen md5 ascii-32-95 1 20 0 1000 1000 0 rtgen sha1 ascii-32-95 1 20 0 1000 1000 0 rcrack . -h 202cb962ac59075b964b07152d234b70

Correct Answer: rcrack . -h 202cb962ac59075b964b07152d234b70 Explanation The rcrack . -h 202cb962ac59075b964b07152d234b70 command will crack the password contained in the 202cb962ac59075b964b07152d234b70 hash. The rcrack . -l /root/hashes.txt command will crack all of the hashes contained in the hash file named hashes.txt. The rtgen sha1 ascii-32-95 1 20 0 1000 1000 0 command is used to create a sha1 rainbow crack table. The rtgen md5 ascii-32-95 1 20 0 1000 1000 0 command is used to create a md5 rainbow crack table.

Carl received a phone call from a woman who states that she is calling from his bank. She tells him that someone has tried to access his checking account and she needs him to confirm his account number and password to discuss further details. He gives her his account number and password. Which of the following types of non-technical password attack has occured? Answers: -Dumpster diving -Social engineering -Password guessing -Shoulder surfing

Correct Answer: Social engineering Explanation: Social engineering relies on human error. It works by feigning trustworthiness to convince someone to share information. Shoulder surfing is watching and recording a password, pin, or access code that is being entered by someone nearby. Dumpster diving relies on finding sensitive information that has been discarded in garbage cans, dumpsters, or other unsecure places that create access for attackers. Password guessing happens when someone is able to easily guess a password, typically because it is very common, like a pet's name or a hobby.


Set pelajaran terkait

Full Length Test Review Notes (94% First Test)

View Set

Unit 4: Contract Sales and Leases ( 1 )

View Set

Chapter 3 - Review of Essential Terms and Concepts

View Set

Accounting 2: Chapter 17 "Activity-Based Costing"

View Set

Stages in the Industry Life Cycle

View Set