A consultant is attempting to harvest credentials from unsecure network protocols in use by the organization. Which of the following commands should the consultant use?
A) tcpdump
B) john
C) hashcat
D) nc
Correct Answer:
Verified
Q99: A company has engaged a penetration tester
Q100: A penetration tester wants to check manually
Q101: A client needs to be PCI compliant
Q102: While performing privilege escalation on a Windows
Q103: A client's systems administrator requests a copy
Q105: A penetration tester has gained access to
Q106: A penetration tester is performing a black-box
Q107: A penetration tester is performing a remote
Q108: Which of the following can be used
Q109: At the information gathering stage, a penetration
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents