
Run an Online Password Attack on Linux
Interactive Video
•
Information Technology (IT), Architecture
•
University
•
Practice Problem
•
Hard
Wayground Content
FREE Resource
Read more
5 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a protocol supported by Hydra?
Cisco
AAA
SMTP
HTTP
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of using lowercase 'L' in Hydra's syntax?
To specify a single username
To specify a single password
To specify a list of passwords
To specify a list of usernames
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Where can you download the Metasploit Ibbl OS for setting up a vulnerable target machine?
Microsoft's website
Rapid7's website
Cisco's website
Oracle's website
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the username used in the Hydra attack example on the FTP service?
user
root
MSF admin
admin
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which file is used as a word list in the Hydra attack example?
passwords.txt
rock u.exe
wordlist.doc
keys.csv
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?