CEH

(Jeff_L) #1

Chapter 7: Gaining Access to a System 423


Chapter 7: Gaining Access to a System



  1. A, D. Usernames are especially useful in the system-hacking process because they let you
    target accounts for password cracking. Enumeration can provide information regarding
    usernames and accounts.

  2. C. Ports are usually uncovered during the scanning phase and not the enumeration phase.

  3. A. System hacking is intended to increase access on a system.

  4. A. System hacking is concerned with several items, including exploiting services on a system.

  5. A. Brute-force attacks are carried out by trying all possible combinations of characters in
    an attempt to uncover the correct one.

  6. B. A rainbow attack or rainbow table attack is designed to generate the hashes necessary to
    perform an offline attack against an extracted hash.

  7. A. A backdoor gives an attacker a means to come back to the system later for further attacks.

  8. B. A password hash is commonly used to store a password in an encrypted format that is
    not reversible in locations such as the SAM database.

  9. B. The SAM database is used to store credential information on a local system.

  10. A. LM is a hashing format used to store passwords.

  11. A. SYSKEY is used to partially encrypt the SAM database in Windows versions from NT 4
    onward.

  12. C. Kerberos is the authentication mechanism preferred over LM and NTLM (all versions).

  13. B. NTLM is a more secure protocol than LM. A little stronger still is NTLMv2, which pro-
    vides additional features such as mutual authentication and stronger encryption.

  14. C. NTFS is required in order to use ADS.

  15. D. Auditpol is used to stop the logging of events on a Windows system.

  16. B. LM hashing is disabled on newer Windows systems, but it can be re-enabled for legacy
    support.

  17. A. Trinity Rescue Kit (TRK) is a Linux distribution used to reset passwords.

  18. A. Complex passwords are a great defense against password guessing.

  19. D. NTLMv2 should be used if a domain controller is not present.

  20. C. Alternate Data Streams are only supported on the NTFS file system. None of the other
    file systems available in Windows currently support the ADS feature.


bapp01.indd 423 22-07-2014 10:56:36

Free download pdf