Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil 212-82 Exam - Topic 10 Question 63 Discussion

Actual exam question for Eccouncil's 212-82 exam
Question #: 63
Topic #: 10
[All 212-82 Questions]

A John-the-Ripper hash dump of an FTP server's login credentials is stored as "target-file" on the Desktop of Attacker Machine-2. Crack the password hashes in the file to recover the login credentials of the FTP server. The FTP root directory hosts an exploit file. Read the exploit file and enter the name of the exploit's author as the answer. Hint: Not all the credentials will give access to the FTP. (Practical Question)

Show Suggested Answer Hide Answer
Suggested Answer: D

John-the-Ripper Usage:

John-the-Ripper is a popular open-source password cracking tool used to detect weak passwords. It works by performing dictionary attacks and brute force attacks on password hashes.


Cracking the Hashes:

Load the hash file into John-the-Ripper using the command:

bash

Copy code

john target-file

John will then attempt to crack the passwords using its internal mechanisms.

Accessing the FTP Server:

Once the hashes are cracked, use the recovered credentials to log in to the FTP server. Not all credentials may be valid, so try each until successful access is gained.

Reading the Exploit File:

Navigate to the FTP root directory and locate the exploit file. Use a command like cat to read its contents:

cat exploit-file

The content of the file will include the author's name, which is 'nullsecurlty' in this scenario.

Contribute your Thoughts:

0/2000 characters
Eliz
1 day ago
I think it's CodeGuard, I've seen it mentioned a lot.
upvoted 0 times
...
Juan
6 days ago
I heard ByteDefender is pretty popular.
upvoted 0 times
...
Lisha
11 days ago
Not convinced any of these are right...
upvoted 0 times
...
Martina
17 days ago
CodeGuard seems like a solid choice too.
upvoted 0 times
...
Jaime
22 days ago
Wait, are you sure about that?
upvoted 0 times
...
Sharita
27 days ago
Definitely going with ByteDefender!
upvoted 0 times
...
Pearly
1 month ago
I heard the exploit file is pretty old.
upvoted 0 times
...
Ricarda
1 month ago
I think the author’s name might be in the exploit file, but I can’t remember if we had to look for clues in the code or just the header.
upvoted 0 times
...
Chara
1 month ago
I’m a bit uncertain about which hashes might actually work for FTP access. I guess I’ll have to try a few combinations.
upvoted 0 times
...
Paulina
2 months ago
This question feels familiar; I think we had a similar one where we had to crack hashes and find an author name. I hope I can recall the right steps.
upvoted 0 times
...
Christiane
2 months ago
I remember practicing with John-the-Ripper, but I'm not sure if I should use the default wordlist or a custom one for this hash dump.
upvoted 0 times
...

Save Cancel