Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Answer 5,6,7 and 8 4. In Part 1 we used the smbclient command, and the lab manual states it is equivalent to the net use

Answer 5,6,7 and 8 image text in transcribed
image text in transcribed
4. In Part 1 we used the smbclient command, and the lab manual states it is equivalent to the net use command in Windows. Look up the net use command and state what it does. Worth 6 points. 5. enum4linux allowed us to find out all sorts of information about the OWASP machine. Which of the following did we NOT discover (and no other enumeration tool allows you to discover this, either)? Worth 2 points. Options Answer A. Minimum Password Length A B. List of users C. Machine's operating system D. Open ports on the machine 6. In Part 1, Step 9, we connected to the null share (or session) using the smbclient command. What is the null share (or session)? When does it occur? What do they allow? Worth 6 points. 7. In Part 2, we used xHydra, which is similar to hydra, to crack passwords on the OWASP machine. Our textbook lists several types of password attacks, which are listed below. Which of the following type of password attack is xHydra? Worth 2 points. Options Answer A. Dictionary B. Offline C. Active D. Passive online 4. In Part 1 we used the smbclient command, and the lab manual states it is equivalent to the net use command in Windows. Look up the net use command and state what it does. Worth 6 points. 5. enum4linux allowed us to find out all sorts of information about the OWASP machine. Which of the following did we NOT discover (and no other enumeration tool allows you to discover this, either)? Worth 2 points. Options Answer A. Minimum Password Length A B. List of users C. Machine's operating system D. Open ports on the machine 6. In Part 1, Step 9, we connected to the null share (or session) using the smbclient command. What is the null share (or session)? When does it occur? What do they allow? Worth 6 points. 7. In Part 2, we used xHydra, which is similar to hydra, to crack passwords on the OWASP machine. Our textbook lists several types of password attacks, which are listed below. Which of the following type of password attack is xHydra? Worth 2 points. Options Answer A. Dictionary B. Offline C. Active D. Passive online

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Modern Database Management

Authors: Jeffrey A. Hoffer Fred R. McFadden

4th Edition

0805360476, 978-0805360479

More Books

Students also viewed these Databases questions

Question

3. What is adverse impact? How can it be proved?

Answered: 1 week ago

Question

Discuss the six most common reasons firms pursue growth.

Answered: 1 week ago

Question

LO2.2 List the main characteristics of the market system.

Answered: 1 week ago