Matt is conducting a penetration test against a Linux server and successfully gained access to an administrative account. He would now like to obtain the password hashes for use in a brute-force attack. Where is he likely to find the hashes, assuming the system is configured to modern security standards?

A. /etc/passwd
B. /etc/hash
C. /etc/secure
D. /etc/shadow


Answer: D. /etc/shadow

Computer Science & Information Technology

You might also like to view...

Which of the following does not generate GUI events?

a. Typing in a text field. b. Selecting an item from a menu. c. Viewing the text in a label. d. Moving the mouse.

Computer Science & Information Technology

A(n) ____ method is accessible to a class's descendents, but not to any other classes in the hierarchy.

A. protected B. private C. dependent D. inherited

Computer Science & Information Technology

A ____ method is also known as a help method.

A. work B. private C. public D. set

Computer Science & Information Technology

?An investigator wants to capture all data on a SATA drive connected to a Linux system. What should the investigator use for the "if=" portion of thedcflddcommand? 

A. ?/dev/hda B. ?/dev/hda1 C. ?/dev/sda D. ?/dev/sda1

Computer Science & Information Technology