Run an Online Password Attack on Linux

Run an Online Password Attack on Linux

Assessment

Interactive Video

Information Technology (IT), Architecture

University

Hard

Created by

Quizizz Content

FREE Resource

The video tutorial covers the use of Hydra for password attacks on various protocols like FTP and Telnet. It explains the syntax for using Hydra, including how to provide usernames and passwords. The tutorial also guides viewers on setting up a vulnerable Unix target machine using Metasploit, and demonstrates executing attacks on FTP and Telnet services, highlighting the ease of guessing passwords with Hydra.

Read more

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a protocol supported by Hydra?

Cisco

AAA

SMTP

HTTP

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of using lowercase 'L' in Hydra's syntax?

To specify a single username

To specify a single password

To specify a list of passwords

To specify a list of usernames

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Where can you download the Metasploit Ibbl OS for setting up a vulnerable target machine?

Microsoft's website

Rapid7's website

Cisco's website

Oracle's website

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the username used in the Hydra attack example on the FTP service?

user

root

MSF admin

admin

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which file is used as a word list in the Hydra attack example?

passwords.txt

rock u.exe

wordlist.doc

keys.csv