Questions
As we conclude this chapter, here is a list of questions for you to test your knowledge regarding this chapter’s material. You will find the answers in the Assessments section of the Appendix:
- Using pydictor, what command could we execute to generate a dictionary of words taken from a website via a scraping process?
- Using psudohash, what command could we execute to generate a dictionary of words with a combination of the keywords we are interested in?
- Which script written in Python has the capacity to execute a brute-force attack, using the output provided by the Nmap port scanner?
- What is the command we could execute using Cerbrutus to execute a brute-force attack against an SSH service, using the
wordlists
/fasttrack.txt
dictionary file for the passwords? - Which Python module can we use to protect a ZIP file with a password, and what method can we execute to create a ZIP file protected with a password?