16A: Test Credentials Flashcards

3.1 Given a scenario, research attack vectors and perform network attacks. 5.3 Explain use cases of the following tools during the phases of a penetration test.

1
Q

File containing data captured from system memory.

A

dump

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A randomly generated string that can be added to the password before hashing.

A

salt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Type of password attack that compares encrypted passwords against a predetermined list of possible password values.

A

dictionary attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Type of password attack where an attacker uses an application to exhaustively try every possible alphanumeric combination to crack encrypted passwords.

A

brute force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Type of password attack that can make use of word lists to create variants and combinations.

A

rule based attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

If the attacker’s dictionary is exhausted, the cracking tool can then try variations of the passwords by trimming or expanding words or substituting numbers or special characters for letters. It can also try specific combinations of characters using placeholders (i.e.,: ?a?a?d?d?d?d)

A

mask attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Brute force attack in which multiple user accounts are tested with a dictionary of common passwords.

A

password spray

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

hash that starts with $1

A

MD5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

hash that starts with $2a

A

blowfish

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

hash that starts with $5

A

SHA-256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

hash that starts with $6

A

SHA-512

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In Windows, this is a simple MD4 hash of the password (encoded as UTF-16 little endian). It is unsalted but allows passwords up to 128 characters long.

A

NT Hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In Kerberos, a token issued to an authenticated account to allow access to authorized application servers.

A

Ticket Granting Ticket (TGT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Used by The Windows Local Security Authority (LSASS) to store a variety of user, service, and application passwords.

A

LSA Secrets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly