Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Use kali Linux to solve the questions. Take screenshot s for your work Question 1 Use the appropriate Kali Linux Commands to show the following:

Use kali Linux to solve the questions.
Take screenshots for your work
image text in transcribed
Question 1 Use the appropriate Kali Linux Commands to show the following: (1 Marks) 1. Display all network interfaces and IP address that are available in your system. Question 2 (2 Marks). You are given a file including a list of MBD5-hashed passwords (hashed_passwords.txt). Now you are requested to use Hashcat tool to get the plain passwords from the hashed passwords based on the following specifications: 1. The attack is straight. 2. The output file is plain_passwords.txt. The dictionary file is /usr/share/wordlists/rockyou.txt.gz (you must use this path) Question 3 (2 Marks). Imagine that your friend had created an account on testasp.vulnweb.com called admin70. Unfortunately, she forgot the password of her account. She only remembered that the password length is between 5 and 7 numbers. Use Hydra tool to find the password based on the given information

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Concepts

Authors: David Kroenke, David Auer, Scott Vandenberg, Robert Yoder

8th Edition

013460153X, 978-0134601533

More Books

Students also viewed these Databases questions

Question

=+6. What five driving forces make CSR more relevant today?

Answered: 1 week ago