Kahoot EH-04-P1 Brute-Force Flashcards
What application would someone use to make a password wordlist based on personal information known about the victim?
a. ) rockyou
b. ) john
c. ) cupp
d. ) crunch
c.)
SHA-1 is a one-way cryptographic function T or F
T
All of the following are HASH algorithms EXCEPT:
a. ) SHA-256
b. ) AES-256
c. ) RSA
d. ) MD5
b.)
All of these are considered issues with using a password for authentication EXCEPT:
a. ) Weak passwords
b. ) Salting a Hash
c. ) Rainbow Tables
d. ) Reusing Passwords
b.)
T or F Using John to crack an encrypted zip files is considered “Online Cracking”
F
John-Jumbo improves performance over John the Ripper by adding:
a. ) GPU support
b. ) Adds support for NTLM
c. ) Using cloud servers
d. ) using more threads
a.)
Which password cracker is used for offline password cracking?
a. ) Hashcat
b. ) medusa
c. ) hydra
d. ) ncrack
a.)
Logging in with a password and a separate pin is a form of two factor authentication T or F
F
Which linux tool is a password list generator that forms passwords based on length and charsets
a. ) Rainbowtable
b. ) crunch
c. ) Rar2John
d. ) Cupp
b.)
HashCat only supports cracking passwords on Linux T or F
F