Password Attacks - EH-04-P1 Flashcards

1
Q

A tool that supports many remote protocols and web format logins
it continously attacks while the server sends an access denied response
basic flags include:
-I [user name]
-P [path to wordlist] [IP]:[Port]

A

Hydra

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

creates a wordlist based on words victims may use
Social engineering on the victim may help the attacker build the list
The victim may use an easy-to-remember password based on personal information

A

Cupp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

was originally CPU-based

takes advantage of CPU

A

John the Ripper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Uses Brute-force to crack RAR, PDF, and ZIP files
It creates or uses a wordlist file for its cracking attempts

Rar2john [filedname] > hast.txt
Zip2John [filename] > hash.txt

A

Rar2John

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A thread-based remote authentication cracking tool
Supports parallel connections
Supports the same protocols as Hydra but operates more slowly

A

Medusa

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cross-platform tool claimed to be the fastest password cracking utility
supports both CPU and GPU

A

HashCat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The fastest and most
reliable tool for remote
authentication

A

Ncrack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly