Execute an Offline Password Attack in Linux

Execute an Offline Password Attack in Linux

Assessment

Interactive Video

Information Technology (IT), Architecture

University

Hard

Created by

Quizizz Content

FREE Resource

The video tutorial introduces Hashcat, a powerful password cracking software, and demonstrates its use in extracting and cracking password hashes from a compromised machine. It covers the process of cleaning hash files, executing Hashcat commands, and monitoring the cracking process. The tutorial emphasizes the importance of identifying the correct hash type and provides tips for using Hashcat effectively.

Read more

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of the shadow file in the context of password cracking?

To store encryption keys

To store user data

To store system logs

To store password hashes

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which option in Hashcat specifies the type of hash you are trying to crack?

O option

H option

A option

M option

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the hash type number for SHA-512 in Unix systems?

1000

1800

512

256

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack mode in Hashcat is used for a dictionary attack?

Combination

Brute force

Hybrid

Straight

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you do if Hashcat does not start cracking due to a wrong hash type?

Increase the processing power

Use a different word list

Check the hash type and correct it

Restart the application

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What tool can help identify the type of hash you are dealing with?

Password manager

Hash identifier

Encryption decoder

Hash converter

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can you check the progress of the cracking process in Hashcat?

By pressing R

By pressing S

By pressing P

By pressing T