Password Attacks

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/14

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

15 Terms

1
New cards

What is a common method through which threat actors gain access to a network?

Obtaining credentials to access the network.

2
New cards

What makes on-path and malware attacks difficult to execute?

They require more effort compared to simply obtaining credentials.

3
New cards

How can plaintext passwords be captured?

By obtaining a password file or sniffing unencrypted traffic on the network.

4
New cards

What happens if authentication credentials are transmitted in cleartext?

They can be intercepted via packet sniffing.

5
New cards

What is the purpose of a cryptographic hash algorithm in password storage?

To produce a fixed-length string from a variable-length string using a one-way function.

6
New cards

Why is a hashed password considered more secure than a plaintext password?

Because the plaintext should not be recoverable from the hash.

7
New cards

What is a potential risk of Base64 encoding for passwords?

The password value can easily be derived from the Base64 string.

8
New cards

What are the common files where password hashes are stored?

%SystemRoot%\System32\config\SAM,

%SystemRoot%\NTDS\NTDS.DIT,

and /etc/shadow.

9
New cards

What two techniques does password cracking software typically use?

Dictionary and brute force techniques.

10
New cards

How does the dictionary attack work in password cracking?

It matches the hash to those produced by ordinary words found in a dictionary.

11
New cards

What can significantly speed up a brute force password attack?

Using a mask based on likely facts about how the target chooses a password.

12
New cards

Why can short and simple passwords be cracked quickly?

They produce fewer combinations, allowing quicker matching by the cracking software.

13
New cards

What is the difference between cryptographic hashing and Base64 encoding?

Cryptographic hashing is a one-way function, while Base64 encoding can be easily reversed to obtain the original password value.

14
New cards

What effect do longer and more complex passwords have on brute force attacks?

They increase the time required to run the attack significantly.

15
New cards

What is the role of Hashcat in the context of password cracking?

It is a utility that can speed up various types of attacks, including brute force attacks.