Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Exam GSEC All Questions
Exam GSEC All Questions

View all questions & answers for the GSEC exam

GIAC Security Administration GSEC Question # 74 Topic 8 Discussion

GSEC Exam Topic 8 Question 74 Discussion:
Question #: 74
Topic #: 8

Use Hashcat to crack a local shadow file. What Is the password for the user account AGainsboro?

Hints

• The shadow file (shadow) and Hashcat wordlist (gsecwordlist.txt) are located in the directory /home /giac /PasswordHashing/

• Run Hashcat in straight mode (flag -a 0) to crack the MD5 hashes (flag -m 500) In the shadow file.

• Use the hash values from the Hashcat output file and the shadow file to match the cracked password with the user name.

• If required, a backup copy of the original files can be found in the shadowbackup directory.

GSEC Question 74

GSEC Question 74


A.

52345234


B.

YOuRF ether?


C.

symbiote


D.

Volcano


E.

QX689PJ688


F.

LlqMM@qe


G.

Noregrets2


Get Premium GSEC Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.