Chapter 10
- Which stage of a cyberattack would be using the scanning tools we discussed belong to?
- Payload delivery
- Exploitation
- Recovery
- Reconnaissance
Answer: D – Scanning activity is part of reconnaissance operations.
- What is Wireshark?
- A protocol analyzer
- A Mafia-linked loan officer
- A physical cable tap
- A network packet generator
Answer: A – Wireshark is a premier protocol analyzer. You’ll often see job postings asking for experience in protocol analysis that name Wireshark specifically.
- What is John the Ripper?
- Jack’s older brother
- A password and hash-cracking utility
- A network packet disassembler
- A WAF bypass exploit
Answer: B – John the Ripper is known for password and hash cracking.
- What do you suppose would happen if the password you are trying to crack isn’t on the wordlist that’s being invoked by your cracking utility?
- The utility will automatically restart using values from the next wordlist in the directory
- The utility will...