Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA Exam PT0-002 Topic 4 Question 79 Discussion

Actual exam question for CompTIA's PT0-002 exam
Question #: 79
Topic #: 4
[All PT0-002 Questions]

A penetration tester wants to crack MD5 hashes more quickly. The tester knows that the first part of the password is Winter followed by four digits and a special character at the end. Which of the following commands should the tester use?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

Kristeen
2 months ago
B) is the way to go! Hashcat is the king of password cracking, and the custom mask is perfect for this scenario. Plus, it's the answer that rhymes with 'cat', so it's gotta be right!
upvoted 0 times
Isabella
12 days ago
D) hashcat hahs.txt -m 500 -a 7 ---force -) -w 4 ---opencl-device-types 1,2
upvoted 0 times
...
Alysa
13 days ago
C) John hash.txt ---format=Raw-MD5 ---rules=jumbo ---wordlist=seasons.txt
upvoted 0 times
...
Phung
24 days ago
B) hashcat hash.txt -m 0 -a seasons.txt ?d?d?d?d?s
upvoted 0 times
...
Angella
1 months ago
A) John hash.txt --format-MD5 ---wordlist-seasons.txt --fork-8 --rules-base64
upvoted 0 times
...
...
Maybelle
2 months ago
C) looks good, but the ---rules=jumbo seems a bit overkill for this specific case. I'd try something more targeted.
upvoted 0 times
...
Alfred
2 months ago
D) has a lot of options, but I'm not sure if the ---force flag is necessary, and the ---opencl-device-types might not be relevant for all setups.
upvoted 0 times
Sabra
28 days ago
C) John hash.txt ---format=Raw-MD5 ---rules=jumbo ---wordlist=seasons.txt
upvoted 0 times
...
Mona
1 months ago
B) hashcat hash.txt -m 0 -a seasons.txt ?d?d?d?d?s
upvoted 0 times
...
Erick
1 months ago
A) John hash.txt --format-MD5 ---wordlist-seasons.txt --fork-8 --rules-base64
upvoted 0 times
...
...
Rosalia
2 months ago
A) looks interesting, but I'm not sure about the --rules-base64 part. Wouldn't it be better to use a more specific rule set for this type of password structure?
upvoted 0 times
Elsa
2 months ago
A) Thanks for the input! I'll go with option C) then. Hopefully, it will help me crack those MD5 hashes more quickly.
upvoted 0 times
...
Lemuel
2 months ago
B) Yeah, I agree. Option C) seems like the best choice for this scenario. It's always good to use a rule set that is tailored to the password format you're trying to crack.
upvoted 0 times
...
Lashawnda
2 months ago
A) I think you're right. Option C) seems to use a more specific rule set called 'jumbo' which might be better for cracking the password structure you described.
upvoted 0 times
...
...
Fernanda
3 months ago
B) seems like the most efficient option here. Using hashcat with the MD5 mode and the custom mask to crack the password that follows a specific pattern.
upvoted 0 times
Svetlana
2 months ago
C) I agree, hashcat with the custom mask is the way to go for cracking those MD5 hashes quickly.
upvoted 0 times
...
Lera
2 months ago
B) Definitely, using a custom mask with hashcat will speed up the cracking process for sure.
upvoted 0 times
...
Erick
2 months ago
A) I think B) is the best choice too. It's specific to cracking MD5 hashes with a known pattern.
upvoted 0 times
...
...
Teri
3 months ago
But hashcat with specific parameters can also be fast, especially with GPU acceleration.
upvoted 0 times
...
Mohammad
3 months ago
I disagree, I believe the answer is C because John with jumbo rules is more efficient.
upvoted 0 times
...
Teri
3 months ago
I think the answer is B because hashcat is known for cracking hashes quickly.
upvoted 0 times
...

Save Cancel