Questions
Answer the following questions to test your knowledge of this chapter:
- Which stage of a cyberattack would be using the scanning tools we discussed belong to?
- Payload delivery
- Exploitation
- Recovery
- Reconnaissance
- What is Wireshark?
- A protocol analyzer
- A Mafia-linked loan officer
- A physical cable tap
- A network packet generator
- What is John the Ripper?
- Jack’s older brother
- A password and hash-cracking utility
- A network packet disassembler
- A WAF bypass exploit
- What do you suppose would happen if the password you are trying to crack isn’t on the wordlist that’s being invoked by your cracking utility?
- The utility will automatically restart using values from the next wordlist in the directory
- The utility will complete the scan from the wordlist and then just make random stuff up, trying to guess the password
- The password will not be successfully cracked, and you’ll need to find another list or method to complete your objective
- The password-cracking...