Hands-On Penetration Testing on Windows
上QQ阅读APP看书,第一时间看更新

Questions

  1. A null input to a hash function produces a null output. (True | False)
  2. The ____ effect refers to the cryptographic property where a small change to the input causes a radical change in the output value. 
  3. What two design flaws cause a 14-character password stored as an LM hash to be significantly easier to crack?
  4. Why do we need to define the server challenge when capturing NetNTLMv1?
  5. What is the predecessor to LLMNR?
  6. Dictionary rule sets decrease the search space, whereas masks increase the brute-force search space. (True | False)
  7. What mask would you use to find a five-character password that starts with two digits, then a symbol, and the remaining two characters are uppercase or lowercase letters after Q (inclusive) in the alphabet?
  8. Jack the Ripper is the most popular password cracker. (True | False)