Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil 212-82 Exam - Topic 2 Question 15 Discussion

Actual exam question for Eccouncil's 212-82 exam
Question #: 15
Topic #: 2
[All 212-82 Questions]

An FTP server has been hosted in one of the machines in the network. Using Cain and Abel the attacker was able to poison the machine and fetch the FTP credentials used by the admin. You're given a task to validate the credentials that were stolen using Cain and Abel and read the file flag.txt

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Ilene
7 days ago
Yeah, but you'd be surprised how many still use it!
upvoted 0 times
...
Madonna
13 days ago
I thought FTP was outdated for sensitive info?
upvoted 0 times
...
Malcom
19 days ago
Wait, are we really using stolen creds? Seems sketchy.
upvoted 0 times
...
Lino
24 days ago
Totally agree, it's a classic tool for this kind of stuff!
upvoted 0 times
...
Pauline
30 days ago
Cain and Abel can really dig up those credentials.
upvoted 0 times
...
Mickie
1 month ago
I feel like I should know this, but I'm confused about how to handle the flag.txt file once I get access to the FTP server.
upvoted 0 times
...
Yuki
1 month ago
I think I need to use the FTP command line to connect with the stolen credentials, but I'm a bit unsure about the syntax.
upvoted 0 times
...
Hyman
1 month ago
This question feels similar to one we did in class about credential harvesting, but I can't recall the exact steps for reading the file after validation.
upvoted 0 times
...
Lawanda
1 month ago
I remember practicing with Cain and Abel, but I'm not entirely sure how to validate the credentials once I have them.
upvoted 0 times
...
Andra
1 month ago
I'm a bit unsure about this one. I know NVMe is a newer storage protocol, but I'm not familiar with all the details. I'll try to eliminate the options that seem clearly wrong, and then make an educated guess on the remaining ones.
upvoted 0 times
...
Lasandra
2 months ago
I'm leaning towards the Cluster master node. That just seems like the logical place for the Monitoring Console to be installed in a single indexer cluster.
upvoted 0 times
...
Phung
2 months ago
Okay, let's see. The manager is trying to change the team's perception about decision-making, so I'm guessing this is related to the cognitive or thinking component of attitude. I'll go with B or C on this one.
upvoted 0 times
...
Nieves
2 months ago
Hmm, I'm a bit confused on this one. I know the "ap" commands are used to manage the Cloud Pak for Data system, but I can't remember which one specifically shows the MTM and serial number. I'll have to think this through carefully.
upvoted 0 times
...
Filiberto
7 months ago
Hmm, I'm feeling lucky with option A. White hats are always the heroes, right?
upvoted 0 times
Junita
5 months ago
User 3: Sounds good to me. Let's see if it works.
upvoted 0 times
...
Shizue
6 months ago
User 2: Yeah, I agree. Let's go with white@hat.
upvoted 0 times
...
Ming
6 months ago
User 1: I think option A is the right choice. White hats are the good guys.
upvoted 0 times
...
...
Suzi
7 months ago
I bet the actual password is 'password123'. Hackers these days are so predictable.
upvoted 0 times
Gladys
5 months ago
D) blue@hat
upvoted 0 times
...
Shaun
5 months ago
C) hat@red
upvoted 0 times
...
Daniela
5 months ago
B) red@hat
upvoted 0 times
...
Chu
5 months ago
A) white@hat
upvoted 0 times
...
Franchesca
5 months ago
D) blue@hat
upvoted 0 times
...
Candra
5 months ago
C) hat@red
upvoted 0 times
...
Diane
5 months ago
B) red@hat
upvoted 0 times
...
Laurena
6 months ago
A) white@hat
upvoted 0 times
...
...
Malcolm
7 months ago
Come on, why would the admin use 'blue@hat' as their password? That's just too obvious.
upvoted 0 times
...
Tanja
7 months ago
Definitely going with option B. Red hats are the best for this kind of hacking stuff!
upvoted 0 times
...
Monroe
7 months ago
I'm not sure, but I think the answer might be C) hat@red because it's a reverse order of the other options.
upvoted 0 times
...
Yoko
7 months ago
I disagree, I believe the answer is D) blue@hat because it's a common color combination used for passwords.
upvoted 0 times
...
Jillian
8 months ago
I think the answer is A) white@hat because it sounds like a legitimate admin credential.
upvoted 0 times
...

Save Cancel