Practical Cyber Hacking Skills for Beginners - Launching a Word List Attack

Interactive Video
•
Information Technology (IT), Architecture
•
University
•
Hard
Wayground Content
FREE Resource
Read more
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the first step in launching a wordlist attack using Hashcat?
Run the command
Specify the hash file
Specify the attack mode
Specify the wordlist file
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which command is used to specify the hash type for an MD5 hash in Hashcat?
M 0
M 1
M 5
M 3
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What should you do if Hashcat provides an error message indicating something isn't supported?
Restart the computer
Use a different wordlist
Reinstall Hashcat
Append --force to the command
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What file is created by Hashcat to store cracked hashes?
hashes.txt
hashcat.POT
cracked_hashes.txt
hashcat.txt
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What happens if the password is not found in the specified wordlist?
Hashcat displays 'session status is exhausted'
Hashcat finds a random password
Hashcat crashes
Hashcat stops without any message
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Can you run multiple MD5 hashes at once in Hashcat?
Yes, but only if they are in separate files
No, only one at a time
No, Hashcat does not support multiple hashes
Yes, by listing them in the hash file
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the result when the correct password is found in the wordlist?
Hashcat displays 'session status is pending'
Hashcat displays 'session status is failed'
Hashcat displays 'session status is cracked'
Hashcat displays 'session status is exhausted'
Similar Resources on Wayground
8 questions
Offline Password Attack on Linux

Interactive video
•
University
8 questions
CompTIA Security+ Certification SY0-601: The Total Course - WPA2 Cracking Lab

Interactive video
•
University
2 questions
Practical Cyber Hacking Skills for Beginners - Launching a Combinator Attack

Interactive video
•
University
2 questions
Learning Python Web Penetration Testing (Video 13)

Interactive video
•
University
2 questions
Web Hacker's Toolbox - Tools Used by Successful Hackers - Google Hacking: Finding Sensitive Data in URLs

Interactive video
•
University
6 questions
Intro To Python Programming - Reading a File

Interactive video
•
KG - University
6 questions
Fundamentals of Object-Oriented Programming - C++ - Files - BUFFER

Interactive video
•
University
6 questions
Creational Design Patterns in Modern C++ - Construction Using the Builder Pattern

Interactive video
•
University
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Information Technology (IT)
20 questions
Definite and Indefinite Articles in Spanish (Avancemos)

Quiz
•
8th Grade - University
7 questions
Force and Motion

Interactive video
•
4th Grade - University
36 questions
Unit 5 Key Terms

Quiz
•
11th Grade - University
7 questions
Figurative Language: Idioms, Similes, and Metaphors

Interactive video
•
4th Grade - University
15 questions
Properties of Equality

Quiz
•
8th Grade - University
38 questions
WH - Unit 3 Exam Review*

Quiz
•
10th Grade - University
21 questions
Advise vs. Advice

Quiz
•
6th Grade - University
12 questions
Reading a ruler!

Quiz
•
9th Grade - University