Offline Password Attack on Windows

Offline Password Attack on Windows

Assessment

Interactive Video

Information Technology (IT), Architecture

University

Hard

Created by

Quizizz Content

FREE Resource

The tutorial explains how to obtain and crack Windows password hashes. It covers accessing the SAM file on a Windows system, using tools like PW Dump to extract hashes, and employing John the Ripper to crack them. The video also discusses advanced password manipulation techniques using John the Ripper's rules.

Read more

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one method to access the SAM file on a Windows system if it is not accessible while the OS is running?

Use a cloud-based service

Use a Windows recovery disk

Run a Linux Live CD

Install a new operating system

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What tool is recommended for extracting password hashes from a Windows machine?

Hashcat

Wireshark

Metasploit

PW Dump

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main difference between LM and NTLM hashes?

LM hashes are more secure

NTLM hashes are more secure

LM hashes are longer

NTLM hashes are deprecated

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which command is used to create a file with the extracted hash for John the Ripper?

nano

touch

echo

cat

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of specifying a format when using John the Ripper?

To enable multi-threading

To increase cracking speed

To ensure compatibility with the hash type

To reduce memory usage

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What file does John the Ripper store cracked passwords in?

hashes.log

passwords.txt

crack.txt

john.pot

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a rule used by John the Ripper for password manipulation?

Double

Extra

Wordlist

Single