Execute an Offline Password Attack on Windows

Execute an Offline Password Attack on Windows

Assessment

Interactive Video

Information Technology (IT), Architecture

University

Practice Problem

Hard

Created by

Wayground Content

FREE Resource

The tutorial explains how to access and extract password hashes from a Windows system using tools like PW Dump and Nordahl's NT password editor. It then guides on preparing these hashes for cracking using a Linux machine and John the Ripper, a popular password cracking tool. The video also covers advanced techniques for password manipulation and cracking using John the Ripper's rules.

Read more

7 questions

Show all answers

1.

OPEN ENDED QUESTION

3 mins • 1 pt

What is the purpose of obtaining hashes from the operating system?

Evaluate responses using AI:

OFF

2.

OPEN ENDED QUESTION

3 mins • 1 pt

Where are the hashes stored in a Windows operating system?

Evaluate responses using AI:

OFF

3.

OPEN ENDED QUESTION

3 mins • 1 pt

What tool can be used to read the Sam file if the operating system is booted?

Evaluate responses using AI:

OFF

4.

OPEN ENDED QUESTION

3 mins • 1 pt

What command is used to dump the password hashes from the Sam file?

Evaluate responses using AI:

OFF

5.

OPEN ENDED QUESTION

3 mins • 1 pt

What is the difference between the LM hash and the NTLM hash?

Evaluate responses using AI:

OFF

6.

OPEN ENDED QUESTION

3 mins • 1 pt

How does John the Ripper assist in cracking password hashes?

Evaluate responses using AI:

OFF

7.

OPEN ENDED QUESTION

3 mins • 1 pt

What are some advanced password manipulation techniques supported by John the Ripper?

Evaluate responses using AI:

OFF

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?