ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 406 - PT0-002 discussion

Report
Export

During an assessment, a penetration tester obtains a list of password digests using Responder. Which of the following tools would the penetration tester most likely use next?

A.
Hashcat
Answers
A.
Hashcat
B.
Hydra
Answers
B.
Hydra
C.
CeWL
Answers
C.
CeWL
D.
Medusa
Answers
D.
Medusa
Suggested answer: A

Explanation:

When a penetration tester obtains a list of password digests using Responder, the next logical step is to attempt to crack these password hashes to retrieve the plaintext passwords. Hashcat is one of the most widely used tools for this purpose. It is a high-performance password recovery tool that supports a wide range of hashing algorithms and can utilize the power of GPU acceleration to significantly speed up the cracking process.

Hashcat is preferred over tools like Hydra, CeWL, and Medusa in this context because it is specifically designed for cracking password hashes rather than brute-forcing login credentials (Hydra, Medusa) or generating custom wordlists (CeWL).

Hashcat official website: Hashcat

Usage examples in various penetration testing reports, including those involving password cracking and hash manipulation.

asked 02/10/2024
Juliet Kihonge
43 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first