what is a ‘null’ user?
In the context of Windows Security, what is a ‘null’ user?
Fingerprinting an Operating System helps a cracker because:
Fingerprinting an Operating System helps a cracker because:
What is GINA?
What is GINA?
How would you resolve this situation?
You are the Security Administrator of Xtrinity, Inc. You write security policies and conduct assesments to protect the company’s network. During one of your periodic checks to see how well policy is being observed by the employees, you discover an employee has attached a modem to his telephone line and workstation. He has used this modem to dial in to his workstation, thereby bypassing your firewall. A security breach has occurred as a direct result of this activity. The employee explains that he used the modem because he had to download software for a department project. How would you resolve this situation?
How would the attacker use netcat to encrypt the information before transmitting onto the wire?
An attacker runs netcat tool to transfer a secret file between two hosts.
Machine A: netcat -l -p 1234 < secretfile
Machine B: netcat 192.168.3.4 > 1234
He is worried about information being sniffed on the network. How would the attacker use netcat to encrypt the information before transmitting onto the wire?
what would be the fastest type of password cracking attack you can run against these hash values and still get
You have retrieved the raw hash values from a Windows 2000 Domain Controller. Using social engineering, you come to know that they are enforcing strong passwords. You understand that all users are required to use passwords that are at least 8 characters in length. All passwords must also use 3 of the 4 following categories: lower case letters, capital letters, numbers and special characters.
With your existing knowledge of users, likely user account names and the possibility that they will choose the easiest passwords possible, what would be the fastest type of password cracking attack you can run against these hash values and still get results?
Which of the following are known weaknesses of LM?
Windows LAN Manager (LM) hashes are known to be weak. Which of the following are known weaknesses of LM? (Choose three)
how best you can achieve this objective?
While examining audit logs, you discover that people are able to telnet into the SMTP server on port 25. You would like to block this, though you do not see any evidence of an
attack or other wrong doing. However, you are concerned about affecting the normal functionality of the email server. From the following options choose how best you can achieve this objective?
Password cracking programs reverse the hashing process to recover passwords.(True/False.
Password cracking programs reverse the hashing process to recover passwords.(True/False.
Which of the following are well know password-cracking programs?
Which of the following are well know password-cracking programs?(Choose all that apply.