Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Exam GSEC All Questions
Exam GSEC All Questions

View all questions & answers for the GSEC exam

GIAC Security Administration GSEC Question # 73 Topic 8 Discussion

GSEC Exam Topic 8 Question 73 Discussion:
Question #: 73
Topic #: 8

Use Hashcat to crack a local shadow file. What Is the password for the user account AGainsboro?

Hints

Hints

• The shadow file (shadow) and Hashcat wordlist (gsecwordlist.txt) are located in the directory. home giac PasswordHashing

- Run Hashcat in straight mod* (flag -a 0) to crack the MD5 hashes (flag -m 500) in the shadow file.

• Use the hash values from the Hashcat output file and the shadow file to match the cracked password with the user name.

• If required, a backup copy of the original files can be found in the shadowbackup directory.

GSEC Question 73


A.

J3@nGr3y


B.

WwBoj25tT7


C.

MsconfiG35


D.

Noregrets2


E.

HowAreWeToday?19


F.

Prometheus


G.

6dWalking8


Get Premium GSEC Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.