ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 279 - PT0-002 discussion

Report
Export

A penetration tester wrote the following Bash script to brute force a local service password:

..ting as expected. Which of the following changes should the penetration tester make to get the script to work?

A.
..echo "The correct password is $p" && break)ho "The correct password is $p" I| break
Answers
A.
..echo "The correct password is $p" && break)ho "The correct password is $p" I| break
B.
.echo "The correct password is $p" && break)o "The correct password is $p" I break
Answers
B.
.echo "The correct password is $p" && break)o "The correct password is $p" I break
C.
echo "The correct password is Sp" && break)echo "The correct password is $p" && break)
Answers
C.
echo "The correct password is Sp" && break)echo "The correct password is $p" && break)
D.
.{ echo "The correct password is $p" && break )WithI| ( echo "The correct password is $p" && break )
Answers
D.
.{ echo "The correct password is $p" && break )WithI| ( echo "The correct password is $p" && break )
Suggested answer: B

Explanation:

CeWL is a tool that can be used to crawl a website and build a wordlist using the data recovered to crack the password on the website. CeWL stands for Custom Word List generator, and it is a Ruby script that spiders a given website up to a specified depth and returns a list of words that can be used for password cracking or other purposes. CeWL can also generate wordlists based on metadata, email addresses, author names, or external links found on the website. CeWL can help a penetration tester create customized wordlists that are tailored to the target website and increase the chances of success for password cracking attacks. DirBuster is a tool that can be used to brute force directories and files names on web servers. w3af is a tool that can be used to scan web applications for vulnerabilities and exploits. Patator is a tool that can be used to perform brute force attacks against various protocols and services.

asked 02/10/2024
J Von
49 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first