Presentation is loading. Please wait.

Presentation is loading. Please wait.

Network Penetration Testing & Defense

Similar presentations


Presentation on theme: "Network Penetration Testing & Defense"— Presentation transcript:

1 Network Penetration Testing & Defense
Password Attacks                     Peer Instruction Questions for Cybersecurity: Pentesting by William E. Johnson, Allison Luzader, Irfan Ahmed is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

2 When attempting to crack an unknown Windows XP LM hash, which method is most efficient?
Complete brute force Rainbow tables Dictionary attack with a large wordlist Passing the hash Birthday attack Answer: B Category: password cracking, hashes

3 A machine that you have accessed stores password hashes without salts
A machine that you have accessed stores password hashes without salts. How would you best crack the hashes? Complete brute force Rainbow tables Dictionary attack with a large wordlist Passing the hash Password guessing Answer: B Category: password cracking, hashes

4 You obtain a leaked database of SHA-1 hashes of LinkedIn passwords
You obtain a leaked database of SHA-1 hashes of LinkedIn passwords. They are unsalted. How would you quickly crack as many passwords as possible? Complete brute force Rainbow tables Dictionary attack with a large wordlist Passing the hash Password guessing Answer: B Category: password cracking, hashes

5 You obtain a dump of password hashes that are salted
You obtain a dump of password hashes that are salted. What is the best approach to obtain as many passwords as possible? Complete brute force Rainbow tables Dictionary attack with a large wordlist Passing the hash Birthday attack Answer: C Category: password cracking, hashes

6 A remote machine within scope is up and accepting NTLM logins
A remote machine within scope is up and accepting NTLM logins. What is necessary to connect to this machine? An NTLM hash A username and an LM password A username and an NTLM password A username and an NTLM hash A username and an LM hash Answer: D Category: pass-the-hash

7 A remote machine within scope is up and accepting LM logins
A remote machine within scope is up and accepting LM logins. What is necessary to connect to this machine? An LM hash A username and an LM password A username and an NTLM password A username and an NTLM hash A username and an LM hash Answer: E Category: pass-the-hash

8 You’ve gained full access to a Windows XP SP2 machine
You’ve gained full access to a Windows XP SP2 machine. How do you obtain its password hashes? They are available in the passwd file They are available in the SAM registry hive They are available in the shadow file They are available in the Ntuser.dat registry hive Answer: B Category: password cracking

9 You’ve gained full access to a modern Ubuntu machine
You’ve gained full access to a modern Ubuntu machine. How do you obtain its password hashes? They are available in the passwd file They are available in the SAM registry hive They are available in the shadow file They are available in the Ntuser.dat registry hive Answer: C Category: password cracking

10 Given an online service that takes unlimited login attempts, which tool would be best to use to crack a password without hashes? John Ophcrack Hydra Hashcat A or C Answer: C Category: password cracking

11 Given a set of LM hashes and a rainbow table, which of these tools would be most efficient to crack some of these hashes? John Ophcrack Hashcat Hydra A or C Answer: B Category: password cracking

12 Which of these tools would be best used on a set of modern Ubuntu password hashes?
John Ophcrack Hashcat Hydra A or C Answer: E Category: password cracking


Download ppt "Network Penetration Testing & Defense"

Similar presentations


Ads by Google