Windows Password Hashing and Security
29 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary advantage of password salting?

  • It increases the password length
  • It makes the password more complex
  • It makes it more difficult to reverse the hashes and defeats pre-computed hash attacks (correct)
  • It adds a second layer of encryption

What is the purpose of the PWDUMP tool?

  • To schedule password cracking tasks
  • To sniff the network for encrypted passwords
  • To crack passwords using rainbow tables
  • To extract LM and NTLM password hashes from the SAM database (correct)

What is the main difference between PWDUMP and FGdump?

  • FGdump extracts cached credentials (correct)
  • PWDUMP is used for password cracking
  • FGdump is used for remote network execution
  • PWDUMP is used for remote network execution

Which password cracking tool is based on rainbow tables?

<p>Ophcrack (A)</p> Signup and view all the answers

What is the limitation of password hashes in Windows?

<p>They are not salted (B)</p> Signup and view all the answers

What is the purpose of L0phtCrack?

<p>To perform password auditing and recovery (A)</p> Signup and view all the answers

What is the primary goal of a privilege escalation attack?

<p>To gain administrative access to a system (D)</p> Signup and view all the answers

What is the primary goal of using encryption techniques in defending against privilege escalation?

<p>To protect sensitive data (A)</p> Signup and view all the answers

What is the main difference between vertical and horizontal privilege escalation?

<p>The level of access gained (D)</p> Signup and view all the answers

Why can an attacker place a malicious DLL in an application directory to escalate privileges?

<p>Because the application does not use a fully qualified path to load the DLL (C)</p> Signup and view all the answers

What is the primary purpose of running users and applications on the least privileges?

<p>To minimize the attack surface (A)</p> Signup and view all the answers

What can an attacker do if they gain administrative privileges using a privilege escalation attack?

<p>Reset the passwords of other non-administrative accounts (D)</p> Signup and view all the answers

What is the primary function of RemoteExec?

<p>To remotely install applications, execute programs/scripts, and update files and folders (A)</p> Signup and view all the answers

What is the name of the tool that can be used to reset passwords using privileges?

<p>Offline NT Password &amp; Registry Editor (D)</p> Signup and view all the answers

What is the primary purpose of patching the systems regularly?

<p>To fix OS and application coding errors and bugs (D)</p> Signup and view all the answers

What is the primary goal of executing malicious programs remotely in the victim's machine?

<p>To gather information that leads to exploitation or loss of privacy (D)</p> Signup and view all the answers

What is the name of the technique used to escalate privileges by placing a malicious DLL in an application directory?

<p>DLL Hijacking (A)</p> Signup and view all the answers

What is the primary function of PDQ Deploy?

<p>To silently install any application or patch (B)</p> Signup and view all the answers

What is the primary purpose of a keylogger?

<p>To gather confidential information about a victim (C)</p> Signup and view all the answers

What is the main difference between a hardware keylogger and a software keylogger?

<p>One is installed on the OS, while the other is embedded in the keyboard (D)</p> Signup and view all the answers

What type of keylogger is placed between the keyboard hardware and the OS?

<p>Physical Keylogger (B)</p> Signup and view all the answers

Which type of keylogger uses Wi-Fi or Bluetooth for transmission?

<p>External Keylogger (A)</p> Signup and view all the answers

What is a legitimate use of keyloggers for home users?

<p>To monitor children's activity (B)</p> Signup and view all the answers

What is the main risk of using an account with administrative privileges?

<p>Undetected execution of malicious code (A)</p> Signup and view all the answers

What is the primary purpose of NTFS Alternate Data Stream (ADS)?

<p>To store metadata about files, such as attributes and access times (C)</p> Signup and view all the answers

How can you delete NTFS streams?

<p>Move the suspected files to a FAT partition (D)</p> Signup and view all the answers

What is the primary goal of steganography?

<p>To conceal data within an ordinary message (A)</p> Signup and view all the answers

What type of utility can help maintain the integrity of an NTFS partition?

<p>File integrity checker (A)</p> Signup and view all the answers

What is the name of a hacking tool that can detect NTFS streams?

<p>All of the above (D)</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser