Passwords Lab Flashcards
What is the primary goal of password cracking tools?
A. Encrypt user data.
B. Test password security.
C. Monitor network traffic.
D. Secure files with hashes.
B
Which is a commonly used hashing algorithm for passwords?
A. AES
B. MD5
C. RSA
D. ECC
B
What is a dictionary attack?
A. Using precomputed hashes to crack passwords.
B. Attempting passwords from a predefined list.
C. Brute-forcing all possible character combinations.
D. Exploiting vulnerabilities in hashing algorithms.
B
What is a common defense against brute force attacks?
A. Hashing passwords with MD5.
B. Using account lockout policies.
C. Encrypting passwords with RSA.
D. Storing passwords as plain text.
B
What is THC-Hydra primarily used for?
A. Cracking password hashes.
B. Conducting dictionary attacks on network protocols.
C. Encrypting user passwords.
D. Testing physical access tokens.
B
Which of the following is a supported protocol for THC-Hydra attacks?
A. HTTPS
B. SSH
C. TLS
D. SFTP
B
What does the -l flag specify in THC-Hydra?
A. The target IP address.
B. The username.
C. The password list.
D. The hash algorithm.
B
Which command is used to perform a dictionary attack with THC-Hydra on SSH?
A. hydra -l user -P passwords.txt ssh://target
B. hydra -u admin -d passwords.txt ssh://target
C. hydra -P dictionary.txt target://ssh
D. hydra -f admin -L passwords ssh://target
A
What is the primary purpose of John the Ripper?
A. Cracking password hashes.
B. Encrypting sensitive data.
C. Monitoring system logs.
D. Securing network communications.
A
Which format does John the Ripper typically expect for hashes?
A. Plaintext.
B. Base64.
C. Hash file formats like MD5, SHA1, etc.
D. Encrypted ZIP files.
C
What is the default cracking mode in John the Ripper?
A. Dictionary attack.
B. Brute-force attack.
C. Single-crack mode.
D. Incremental mode.
C
Which of the following commands runs John the Ripper on a hash file?
A. john hashfile.txt
B. john -d hashes.txt
C. john -encrypt hashfile
D. john -h hashes.txt
A
What is Hashcat primarily used for?
A. Cracking password hashes.
B. Encrypting user passwords.
C. Hashing files for integrity checks.
D. Generating random passwords.
A
What is a key feature of Hashcat?
A. It supports only dictionary attacks.
B. It utilizes GPU acceleration for cracking.
C. It can only crack MD5 hashes.
D. It cannot perform brute force attacks.
B
Which of the following is a supported attack mode in Hashcat?
A. Time-based attack.
B. Rule-based attack.
C. Combinatorial attack.
D. Steganographic attack.
B
Which Hashcat command specifies a dictionary file?
A. hashcat -d dict.txt hashfile
B. hashcat -P dictionary.txt -hashes
C. hashcat -a 0 -m 100 hashfile.txt dict.txt
D. hashcat -l dictionary hashfile.txt
C
What is the main difference between a brute force and a dictionary attack?
A. Brute force uses all combinations, while dictionary uses predefined lists.
B. Brute force is faster than dictionary attacks.
C. Dictionary attacks target hashes, while brute force targets plaintext passwords.
D. Brute force requires GPU acceleration.
A
What is a hybrid attack?
A. A combination of brute force and social engineering.
B. Combining dictionary and rule-based attacks.
C. A time-synchronized token attack.
D. Cracking biometric-based passwords.
B
What is a rainbow table attack?
A. Using precomputed hash values to crack passwords.
B. Encrypting passwords with symmetric keys.
C. Breaking passwords using hardware devices.
D. Monitoring network traffic for plain text passwords.
A
Which of the following is a defense against rainbow table attacks?
A. Salting password hashes.
B. Using shorter passwords.
C. Encrypting password files.
D. Avoiding multi-factor authentication.
A