What do Trinoo, TFN2k, WinTrinoo, T-Sight, and Stracheldraht have in common?
What do Trinoo, TFN2k, WinTrinoo, T-Sight, and Stracheldraht have in common?
which location, SAM hash passwords are stored in Windows 7?
In which location, SAM hash passwords are stored in Windows 7?
How can you determine if an LM hash you extracted contains a password that is less than 8 characters long?
How can you determine if an LM hash you extracted contains a password that is less than 8
characters long?
How would you disable file extensions in Apache servers?
File extensions provide information regarding the underlying server technology. Attackers can use
this information to search vulnerabilities and launch attacks. How would you disable file extensions
in Apache servers?
what is considered a brute force attack?
When discussing passwords, what is considered a brute force attack?
What is a good example of a programming error that Bob can use to explain to the management how encryption wil
Bob has a good understanding of cryptography, having worked with it for many years.
Cryptography is used to secure data from specific threats, but it does not secure the application
from coding errors. It can provide data privacy; integrity and enable strong authentication but it
cannot mitigate programming errors. What is a good example of a programming error that Bob can
use to explain to the management how encryption will not address all their security concerns?
Which of the following are well know password-cracking programs?
Which of the following are well know password-cracking programs?(Choose all that apply.
What defensive measures will you take to protect your network from these attacks?
Finding tools to run dictionary and brute forcing attacks against FTP and Web servers is an easy
task for hackers. They use tools such as arhontus or brutus to break into remote servers.
A command such as this, will attack a given 10.0.0.34 FTP and Telnet servers simultaneously with
a list of passwords and a single login namE. linksys. Many FTP-specific password-guessing tools
are also available from major security sites.
What defensive measures will you take to protect your network from these attacks?
Password cracking programs reverse the hashing process to recover passwords.(True/False.
Password cracking programs reverse the hashing process to recover passwords.(True/False.
If the two numbers p and q are discovered through a _____________ process, then the private key can be derived
One of the most common and the best way of cracking RSA encryption is to begin to derive the
two prime numbers, which are used in the RSA PKI mathematical process. If the two numbers p
and q are discovered through a _____________ process, then the private key can be derived.