Network Penetration Testing & Defense Password Attacks Peer Instruction Questions for Cybersecurity: Pentesting by William E. Johnson, Allison Luzader, Irfan Ahmed is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
When attempting to crack an unknown Windows XP LM hash, which method is most efficient? Complete brute force Rainbow tables Dictionary attack with a large wordlist Passing the hash Birthday attack Answer: B Category: password cracking, hashes
A machine that you have accessed stores password hashes without salts A machine that you have accessed stores password hashes without salts. How would you best crack the hashes? Complete brute force Rainbow tables Dictionary attack with a large wordlist Passing the hash Password guessing Answer: B Category: password cracking, hashes
You obtain a leaked database of SHA-1 hashes of LinkedIn passwords You obtain a leaked database of SHA-1 hashes of LinkedIn passwords. They are unsalted. How would you quickly crack as many passwords as possible? Complete brute force Rainbow tables Dictionary attack with a large wordlist Passing the hash Password guessing Answer: B Category: password cracking, hashes
You obtain a dump of password hashes that are salted You obtain a dump of password hashes that are salted. What is the best approach to obtain as many passwords as possible? Complete brute force Rainbow tables Dictionary attack with a large wordlist Passing the hash Birthday attack Answer: C Category: password cracking, hashes
A remote machine within scope is up and accepting NTLM logins A remote machine within scope is up and accepting NTLM logins. What is necessary to connect to this machine? An NTLM hash A username and an LM password A username and an NTLM password A username and an NTLM hash A username and an LM hash Answer: D Category: pass-the-hash
A remote machine within scope is up and accepting LM logins A remote machine within scope is up and accepting LM logins. What is necessary to connect to this machine? An LM hash A username and an LM password A username and an NTLM password A username and an NTLM hash A username and an LM hash Answer: E Category: pass-the-hash
You’ve gained full access to a Windows XP SP2 machine You’ve gained full access to a Windows XP SP2 machine. How do you obtain its password hashes? They are available in the passwd file They are available in the SAM registry hive They are available in the shadow file They are available in the Ntuser.dat registry hive Answer: B Category: password cracking
You’ve gained full access to a modern Ubuntu machine You’ve gained full access to a modern Ubuntu machine. How do you obtain its password hashes? They are available in the passwd file They are available in the SAM registry hive They are available in the shadow file They are available in the Ntuser.dat registry hive Answer: C Category: password cracking
Given an online service that takes unlimited login attempts, which tool would be best to use to crack a password without hashes? John Ophcrack Hydra Hashcat A or C Answer: C Category: password cracking
Given a set of LM hashes and a rainbow table, which of these tools would be most efficient to crack some of these hashes? John Ophcrack Hashcat Hydra A or C Answer: B Category: password cracking
Which of these tools would be best used on a set of modern Ubuntu password hashes? John Ophcrack Hashcat Hydra A or C Answer: E Category: password cracking