Matt is conducting a penetration test against a Linux server and successfully gained access to an administrative account. He would now like to obtain the password hashes for use in a brute-force attack. Where is he likely to find the hashes, assuming the system is configured to modern security standards?
A. /etc/passwd
B. /etc/hash
C. /etc/secure
D. /etc/shadow
Answer: D. /etc/shadow
Computer Science & Information Technology
You might also like to view...
Which of the following does not generate GUI events?
a. Typing in a text field. b. Selecting an item from a menu. c. Viewing the text in a label. d. Moving the mouse.
Computer Science & Information Technology
A(n) ____ method is accessible to a class's descendents, but not to any other classes in the hierarchy.
A. protected B. private C. dependent D. inherited
Computer Science & Information Technology
A ____ method is also known as a help method.
A. work B. private C. public D. set
Computer Science & Information Technology
?An investigator wants to capture all data on a SATA drive connected to a Linux system. What should the investigator use for the "if=" portion of thedcflddcommand?
A. ?/dev/hda B. ?/dev/hda1 C. ?/dev/sda D. ?/dev/sda1
Computer Science & Information Technology