0% found this document useful (0 votes)
59 views

CEH Questions

An intruder has gained access to a remote system "ith a valid username and ass"ord, the attac! can be carried out "ith the use of #ire"all rules$.

Uploaded by

sofianovic
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
59 views

CEH Questions

An intruder has gained access to a remote system "ith a valid username and ass"ord, the attac! can be carried out "ith the use of #ire"all rules$.

Uploaded by

sofianovic
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 11

QUESTION 1 Exhibit Study the log given in the exhibit, Precautionary measures to revent this attac!

"ould include "riting #ire"all rules$ O# these #ire"all rules, "hich among the #ollo"ing "ould be a ro riate% &$ 'isallo" U'P () in #rom outside to 'NS server *$ &llo" U'P () in #rom 'NS server to outside +$ 'isallo" T+P () in #orm secondaries or ISP server to 'NS server '$ *loc! all U'P tra##ic ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, QUESTION .ou are attem ting to ma out the #ire"all olicy #or an organi/ation$ .ou discover your target system is one ho beyond the #ire"all$ Using h ing-, you send S.N ac!ets "ith the exact TT0 o# the target system starting at ort 1 and going u to ort 11-2$ 3hat is this rocess !no"n as% &$ 4oot rinting *$ 4ire"al!ing +$ Enumeration '$ Idle scanning ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, QUESTION ) Once an intruder has gained access to a remote system "ith a valid username and ass"ord, the attac!er "ill attem t to increase his rivileges by escalating the used account to one that has increased rivileges$ such as that o# an administrator$ 3hat "ould be the best countermeasure to rotect against escalation o# riveges% &$ 5ive users to!ens *$ 5ive user the least amount o# rivileges +$ 5ive users t"o ass"ords '$ 5ive users a strong olicy document ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, QUESTION 2 3hich one o# the #ollo"ing attac!s "ill ass through a net"or! layer intrusion detection system undetected% &$ & teardro attac! *$ & S.N #lood attac! +$ & 'NS s oo#ing attac! '$ & test$cgi attac! ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, QUESTION ( 3hy "ould an ethical hac!er use the techni6ue o# #ire"al!ing% &$ It is a techni6ue used to discover "ireless net"or! on #oot$

*$ It is a techni6ue used to ma routers on a net"or! lin!$ +$ It is a techni6ue used to discover the nature o# rules con#igured on a gate"ay$ '$ It is a techni6ue used to discover inter#aces in romiscuous mode$ ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, QUESTION 7 3hat ma!es "eb a lication vulnerabilities so aggravating% 8+hoose t"o9 &$ They can be launched through an authori/ed ort$ *$ & #ire"all "ill not sto them$ +$ They exist only on the 0inux lat#orm$ '$ They are detectable by most leading antivirus so#t"are$ ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, QUESTION : &n em loyee "ants to de#eat detection by a net"or!,based I'S a lication$ ;e does not "ant to attac! the system containing the I'S a lication$ 3hich o# the #ollo"ing strategies can be used to de#eat detection by a net"or!,based I'S a lication% 8+hoose the best ans"er9 &$ +reate a net"or! tunnel$ *$ +reate a multi le #alse ositives$ +$ +reate a S.N #lood$ '$ +reate a ing #lood$ ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, QUESTION < +arl has success#ully com romised a "eb server #rom behind a #ire"all by ex loiting a vulnerability in the "eb server rogram$ ;e "ants to roceed by installing a bac!door rogram$ ;o"ever, he is a"are that not all inbound orts on the #ire"all are in the o en state$ 4rom the list given belo", identi#y the ort that is most li!ely to be o en and allo"ed to reach the server that +arl has =ust com romised$ &$ () *$ 111 +$ -( '$ 7> ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, QUESTION > Neil monitors his #ire"all rules and log #iles closely on a regular basis$ Some o# the users have com lained to Neil that there are a #e" em loyees "ho are visiting o##ensive "eb sites during "or! hours, "ithout consideration #or others$ Neil !no"s that he has an u dated content #iltering system and that such access should not be authori/ed$ 3hat ty e o# techni6ue might be used by these o##enders to access the Internet "ithout restriction% &$ They are using U'P "hich is al"ays authori/ed at the #ire"all$ *$ They are using tunneling so#t"are "hich allo"s them to communicate "ith rotocols in a

"ay it "as not intended$ +$ They have been able to com romise the #ire"all, modi#y the rules, and give themselves ro er access$ '$ They are using an older version o# Internet Ex lorer that allo"s them to by ass the roxy server$ ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, QUESTION 11 The rogrammers on your team are analy/ing the #ree, o en source so#t"are being used to run 4TP services on a server in your organi/ation$ They notice that there is excessive number o# #unctions in the source code that might lead to bu##er over#lo"$ These +?? #unctions do not chec! bounds$ Identi#y the line the source code that might lead to bu##er over#lo"$ &$ 0ine number )1$ *$ 0ine number 1( +$ 0ine number < '$ 0ine number 12 QUESTION 1 'oug is conducting a ort scan o# a target net"or!$ ;e !no"s that his client target net"or! has a "eb server and that there is a mail server also "hich is u and running$ 'oug has been s"ee ing the net"or! but has not been able to elicit any res onse #rom the remote target$ 3hich o# the #ollo"ing could be the most li!ely cause behind this lac! o# res onse% Select 2$ &$ U'P is #ilted by a gate"ay *$ The ac!et TT0 value is too lo" and cannot reach the target +$ The host might be do"n '$ The destination net"or! might be do"n E$ The T+P "indo"s si/e does not match 4$ I+@P is #iltered by a gate"ay ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, QUESTION Exhibit Aoe ;ac!er runs the h ing- hac!ing tool to redict the target hostBs se6uence numbers in one o# the hac!ing session$ 3hat does the #irst and second column mean% Select t"o$ &$ The #irst column re orts the se6uence number *$ The second column re orts the di##erence bet"een the current and last se6uence number +$ The second column re orts the next se6uence number '$ The #irst column re orts the di##erence bet"een current and last se6uence number ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, QUESTION ) 3hile er#orming a ing s"ee o# a subnet you receive an I+@P re ly o# +ode )CTy e 1) #or all the ings sent out$ 3hat is the most li!ely cause behind this res onse%

&$ The #ire"all is dro ing the ac!ets$ *$ &n in,line I'S is dro ing the ac!ets$ +$ & router is bloc!ing I+@P$ '$ The host does not res ond to I+@P ac!ets$ ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, QUESTION 2 The #ollo"ing excer t is ta!en #rom a honey ut log$ The log ca tures activities across three days$ There are several intrusion attem tsD ho"ever, a #e" are success#ul$ Study the log given belo" and ans"er the #ollo"ing 6uestionE 8NoteE The ob=ective o# this 6uestions is to test "hether the student has learnt about assive OS #inger rinting 8"hich should tell them the OS #rom log ca tures9E can they tell a SQ0 in=ection attac! signatureD can they in#er i# a user I' has been created by an attac!er and "hether they can read lain source , destination entries #rom log entries$9 3hat can you in#er #rom the above log% &$ The system is a "indo"s system "hich is being scanned unsuccess#ully$ *$ The system is a "eb a lication server com romised through SQ0 in=ection$ +$ The system has been com romised and bac!doored by the attac!er$ '$ The actual IP o# the success#ul attac!er is -2$>$-(($()$ ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, QUESTION ( *ob has been hired to er#orm a enetration test on +ert!iller $com$ ;e begins by loo!ing at IP address ranges o"ned by the com any and details o# domain name registration$ ;e then goes to Ne"s 5rou s and #inancial "eb sites to see i# they are lea!ing any sensitive in#ormation o# have any technical details online$ 3ithin the context o# enetration testing methodology, "hat hase is *ob involved "ith% &$ Passive in#ormation gathering *$ &ctive in#ormation gathering +$ &ttac! hase '$ Fulnerability @a ing ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, QUESTION 7 3hich o# the #ollo"ing "ould be the best reason #or sending a single S@TP message to an address that does not exist "ithin the target com any% &$ To create a denial o# service attac!$ *$ To veri#y in#ormation about the mail administrator and his address$ +$ To gather in#ormation about internal hosts used in email treatment$ '$ To gather in#ormation about rocedures that are in lace to deal "ith such messages$ ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, QUESTION : .ou are conducting a ort scan on a subnet that has I+@P bloc!ed$ .ou have discovered -) live systems and a#ter scanning each o# them you notice that they all sho" ort -1 in closed state$

3hat should be the next logical ste that should be er#ormed% &$ +onnect to o en orts to discover a lications$ *$ Per#orm a ing s"ee to identi#y any additional systems that might be u $ +$ Per#orm a S.N scan on ort -1 to identi#y any additional systems that might be u $ '$ Gescan every com uter to veri#y the results$ ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, QUESTION < &nn "ould li!e to er#orm a reliable scan against a remote target$ She is not concerned about being stealth at this oint$ 3hich o# the #ollo"ing ty e o# scans "ould be the most accurate and reliable o tion% &$ & hal#,scan *$ & U'P scan +$ & T+P +onnect scan '$ & 4IN scan ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, QUESTION > 3hat ty e o# ort scan is sho"n belo"% &$ Idle Scan *$ 3indo"s Scan +$ H@&S Scan '$ S.N Stealth Scan ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, QUESTION 11 3ar dialing is a very old attac! and de icted in movies that "ere made years ago$ 3hy "ould a modem security tester consider using such an old techni6ue% &$ It is cool, and i# it "or!s in the movies it must "or! in real li#e$ *$ It allo"s circumvention o# rotection mechanisms by being on the internal net"or!$ +$ It allo"s circumvention o# the com any P*H$ '$ & good security tester "ould not use such a derelict techni6ue$ ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, QUESTION 11 &n attac!er is attem ting to telnet into a cor orationBs system in the '@I$ The attac!er doesnBt "ant to get caught and is s oo#ing his IP address$ &#ter numerous tries he remains unsuccess#ul in connecting to the system$ The attac!er rechec!s that the target system is actually listening on Port -) and he veri#ies it "ith both nma and h ing-$ ;e is still unable to connect to the target system$ 3hat is the most robable reason% &$ The #ire"all is bloc!ing ort -) to that system$ *$ ;e cannot s oo# his IP and success#ully use T+P$ +$ ;e needs to use an automated tool to telnet in$ '$ ;e is attac!ing an o erating system that does not re ly to telnet even "hen o en$ ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, QUESTION 1.ou are scanning into the target net"or! #or the #irst time$ .ou #ind very #e" conventional orts o en$

3hen you attem t to er#orm traditional service identi#ication by connecting to the o en orts, it yields either unreliable or no results$ .ou are unsure o# "hich rotocols are being used$ .ou need to discover as many di##erent rotocols as ossible$ 3hich !ind o# scan "ould you use to achieve this% 8+hoose the best ans"er9 &$ Nessus scan "ith T+P based ings$ *$ Nma scan "ith the ,sP 8Ping scan9 s"itch$ +$ Netcat scan "ith the ,u ,e s"itches$ '$ Nma "ith the ,sO 8Ga" IP ac!ets9 s"itch$ QUESTION 1 *ubba has =ust accessed he re#erred ecommerce "eb site and has s otted an item that he "ould li!e to buy$ *ubba considers the rice a bit too stee $ ;e loo!s at the source code o# the "eb age and decides to save the age locally, so that he can modi#y the age variables$ In the context o# "eb a lication security, "hat do you thin! *ubba has changes% &$ & hidden #orm #ield value$ *$ & hidden rice value$ +$ &n integer variable$ '$ & age cannot be changed locally, as it is served by a "eb server$

,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, QUESTION .ou "ant to carry out session hi=ac!ing on a remote server$ The server and the client are communicating via T+P a#ter a success#ul T+P three "ay handsha!e$ The server has =ust received ac!et J1-1 #rom the client$ The client has a receive "indo" o# -11 and the server has a receive "indo" o# -(1$ 3ithin "hat range o# se6uence numbers should a ac!et, sent by the client #all in order to be acce ted by the server% &$ -11,-(1 *$ 1-1,):1 +$ 1-1,)-1 '$ 1-1,-)1 E$ 1-1,):1

,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, QUESTION ) .ou have been called to investigate a sudden increase in net"or! tra##ic at +ert!iller $ It seems that the tra##ic generated "as too heavy that normal business #unctions could no longer be rendered to external em loyees and clients$ &#ter a 6uic! investigation, you #ind that the com uter has services running attached to T4N-! and Trinoo so#t"are$ 3hat do you thin! "as the most li!ely cause behind this sudden increase in tra##ic%

&$ & distributed denial o# service attac!$ *$ & net"or! card that "as =abbering$ +$ & bad route on the #ire"all$ '$ Invalid rules entry at the gate"ay$ ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, QUESTION 2 S.N 4lood is a 'OS attac! in "hich an attac!er deliberately violates the three,"ay handsha!e and o ens a large number o# hal#,o en T+P connections$ The signature #or S.N 4lood attac! isE &$ The source and destination address having the same value$ *$ The source and destination ort numbers having the same value$ +$ & large number o# S.N ac!ets a earing on a net"or! "ithout the corres onding re ly ac!ets$ '$ & large number o# S.N ac!ets a earing on a net"or! "ith the corres onding re ly ac!ets$ ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, QUESTION ( 3hich de#inition among those given belo" best describes a covert channel% &$ & server rogram using a ort that is not "ell !no"n$ *$ @a!ing use o# a rotocol in a "ay it is not intended to be used$ +$ It is the multi lexing ta!ing lace on a communication lin!$ '$ It is one o# the "ea! channels used by 3EP "hich ma!es it insecure$

,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, QUESTION 7 3hile robing an organi/ation you discover that they have a "ireless net"or!$ 4rom your attem ts to connect to the 30&N you determine that they have de loyed @&+ #iltering by using &+0 on the access oints$ 3hat "ould be the easiest "ay to circumvent and communicate on the 30&N% &$ &ttem t to crac! the 3EP !ey using &irsnort$ *$ &ttem t to brute #orce the access oint and u date or delete the @&+ &+0$ +$ Steel a client com uter and use it to access the "ireless net"or!$ '$ Sni## tra##ic i# the 30&N and s oo# your @&+ address to one that you ca tured$

,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, QUESTION : Ta!e a loo! at the #ollo"ing attac! on a 3eb Server using obstructed UG0E htt ECC"""$exam le$comCscri t$ext%tem lateK-eK-eK-eK-eK-eK-#K-eK-#K7(K:2K7 )K-#K:1K71K:)K:)K::K72 The re6uest is made u o#E K-eK-eK-#K-eK-eK-#K-eK-#K L $$C$$C$$C K7(K:2K7) L etc K-# L C K:1K71K:)K:)K::K72 L ass"d ;o" "ould you rotect in#ormation systems #rom these attac!s%

&$ +on#igure 3eb Server to deny re6uests involving Unicode characters$ *$ +reate rules in I'S to alert on strange Unicode re6uests$ +$ Use SS0 authentication on 3eb Servers$ '$ Enable &ctive Scri ts 'etection at the #ire"all and routers$

,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, QUESTION < 3hich o# the #ollo"ing is NOT a valid Net3are access level% &$ Not 0ogged in *$ 0ogged in +$ +onsole &ccess '$ &dministrator ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, QUESTION > 3hile examining audit logs, you discover that eo le are able to telnet into the S@TP server on ort -($ .ou "ould li!e to bloc! this, though you do not see any evidence o# an attac! or other "ring doing$ ;o"ever, you are concerned about a##ecting the normal #unctionality o# the email server$ 4rom the #ollo"ing o tions choose ho" best you can achieve this ob=ective% &$ *loc! ort -( at the #ire"all$ *$ Shut o## the S@TP service on the server$ +$ 4orce all connections to use a username and ass"ord$ '$ S"itch #rom 3indo"s Exchange to UNIH Sendmail$ E$ None o# the above$ ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, QUESTION 11 &ccess control is o#ten im lemented through the use o# @&+ address #iltering on "ireless &ccess Points$ 3hy is this considered to be a very limited security measure% &$ Fendors @&+ address assignment is ublished on the Internet$ *$ The @&+ address is not a real random number$ +$ The @&+ address is broadcasted and can be ca tured by a sni##er$ '$ The @&+ address is used ro erly only on @acintosh com uters$

,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, QUESTION 11 3hile revie"ing the result o# scanning run against a target net"or! you come across the #ollo"ingE 3hich among the #ollo"ing can be used to get this out ut% &$ & *o-! system 6uery$ *$ nma rotocol scan +$ & sni##er '$ &n SN@P "al!

,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, QUESTION 1In order to attac! a "ireless net"or!, you ut u can access oint and override the signal o# the real access oint$ &s users send authentication data, you are able to ca ture it$ 3hat !ind o# attac! is this% &$ Gouge access oint attac! *$ Unauthori/ed access oint attac! +$ 3ar +hal!ing '$ 3EP attac!

,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, QUESTION 1) 3indo"s 0&N @anager 80@9 hashes are !no"n to be "ea!$ 3hich o# the #ollo"ing are !no"n "ea!nesses o# 0@% 8+hoose three9 &$ +onverts ass"ords to u ercase$ *$ ;ashes are sent in clear text over the net"or!$ +$ @a!es use o# only )- bit encry tion$ '$ E##ective length is : characters$

,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, QUESTION 12 .ou are manually conducting Idle Scanning using ; ing-$ 'uring your scanning you notice that almost every 6uery increments the IPI' regardless o# the ort being 6ueried$ One or t"o o# the 6ueries cause the IPI' to increment by more than one value$ 3hy do you thin! this occurs% &$ The /ombie you are using is not truly idle$ *$ & state#ul ins ection #ire"all is resetting your 6ueries$ +$ ; ing- cannot be used #or idle scanning$ '$ These orts are actually o en on the target system$ QuestionE 1 3hat is the name o# the so#t"are tool used to crac! a single account on Net"are Servers using a dictionary attac!% &$ NP3+rac! *$ N3P+rac! +$ Nov+rac! '$ +rac!Nov E$ 5et+rac! &ns"erE * Ex lanationE N3P+rac! is the so#t"are tool used to crac! single accounts on Net"are servers$ QuestionE -

;o" can you determine i# an 0@ hash you extracted contains a ass"ord that is less than < characters long% &$ There is no "ay to tell because a hash cannot be reversed *$ The right most ortion o# the hash is al"ays the same +$ The hash al"ays starts "ith &*>-)' '$ The le#t most ortion o# the hash is al"ays the same E$ & ortion o# the hash "ill be all 1Bs &ns"erE * Ex lanationE 3hen loosheets at an extracted 0@ hash, you "ill sometimes observe that the right most ortion is al"ays the same$ This is adding that has been added to a ass"ord that is less than < characters long$ QuestionE ) Several o# your co,"or!ers are having a discussion over the etcC ass"d #ile$ They are at odds over "hat ty es o# encry tion are used to secure 0inux ass"ords$8+hoose all that a ly9$ &$ 0inux *$ 0inux +$ 0inux '$ 0inux E$ 0inux ass"ords can be encry ted "ith @'( ass"ords can be encry ted "ith S;& ass"ords can be encry ted "ith 'ES ass"ords can be encry ted "ith *lo"#ish ass"ords are encry ted "ith asymmetric algrothims

&ns"erE &, + ' Ex lanationE 0inux ass"ords can be encry ted "ith several ty es o# hashing algorithms$ These include S;Q, @'(, and *lo"#ish$ QuestionE 2 3hat are the t"o basic ty es o# attac!s%8+hoose t"o$ &$ 'oS *$ Passive +$ Sni##ing '$ &ctive E$ +racsheets &ns"erE *, ' Ex lanationE Passive and active attac!s are the t"o basic ty es o# attac!s$ QuestionE ( Sni##ing is considered an active attac!$ &$ True *$ 4alse &ns"erE * Ex lanationE Sni##ing is considered a assive attac!$ QuestionE 7

3hen discussing ass"ords, "hat is considered a brute #orce attac!% &$ .ou attem t every single ossibility until you exhaust all ossible combinations or discover the ass"ord *$ .ou threaten to use the rubber hose on someone unless they reveal their ass"ord +$ .ou load a dictionary o# "ords into your cracsheets rogram '$ .ou create hashes o# a large number o# "ords and com are it "ith the encry ted ass"ords E$ .ou "ait until the ass"ord ex ires &ns"erE & Ex lanationE *rute #orce cracsheets is a time consuming rocess "here you try every ossible combination o# letters, numbers, and characters until you discover a match$

You might also like