Why were these passwords cracked so quickly?
You are the network administrator for a small bank in Dallas, Texas. To ensure network security, you enact a security policy that requires all users to have 14 character passwords. After giving your users 2 weeks notice, you change the Group Policy to force 14 character passwords. A week later you dump the SAM database from the standalone server and run a password-cracking tool against it. Over 99% of the passwords are broken within an hour. Why were these passwords cracked so quickly?
Why would you want to initiate a DoS attack on a system you are testing?
You work as a penetration tester for Hammond Security Consultants. You are currently working on a contract for the state government of California. Your next step is to initiate a DoS attack on their network. Why would you want to initiate a DoS attack on a system you are testing?
Why are Linux/Unix based computers better to use than Windows computers for idle scanning?
Why are Linux/Unix based computers better to use than Windows computers for idle scanning?
What operating system would respond to the following command?
What operating system would respond to the following command?
In Linux, what is the smallest possible shellcode?
In Linux, what is the smallest possible shellcode?
At what layer of the OSI model do routers function on?
At what layer of the OSI model do routers function on?
What type of attack has the technician performed?
Paul’s company is in the process of undergoing a complete security audit including logical and physical security testing. After all logical tests were performed; it is now time for the physical round to begin. None of the employees are made aware of this round of testing. The security-auditing firm sends in a technician dressed as an electrician. He waits outside in the lobby for some employees to get to work and follows behind them when they access the restricted areas. After entering the main office, he is able to get into the server room telling the IT manager that there is a problem with the outlets in that room. What type of attack has the technician performed?
On Linux/Unix based Web servers, what privilege should the daemon service be run under?
On Linux/Unix based Web servers, what privilege should the daemon service be run under?
What is kept in the following directory?
What is kept in the following directory? HKLMSECURITYPolicySecrets
What is the target host IP in the following command?
What is the target host IP in the following command?