100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Tentamen (uitwerkingen)

TESTOUT ETHICAL HACKER PRO LABS (MODULES 8-15) EXAM 2025

Beoordeling
-
Verkocht
-
Pagina's
43
Cijfer
A+
Geüpload op
17-11-2024
Geschreven in
2024/2025

TESTOUT ETHICAL HACKER PRO LABS (MODULES 8-15) EXAM 2025

Instelling
TESTOUT ETHICAL HACKER PRO LABS
Vak
TESTOUT ETHICAL HACKER PRO LABS











Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
TESTOUT ETHICAL HACKER PRO LABS
Vak
TESTOUT ETHICAL HACKER PRO LABS

Documentinformatie

Geüpload op
17 november 2024
Aantal pagina's
43
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

TESTOUT ETHICAL HACKER PRO LABS (MODULES 8-15)
EXAM 2025



8.1.4 Analyze a USB keylogger attack


The CEO of CorpNet.xyz has hired your firm to obtain some passwords
for their company. A senior IT network administrator, Oliver Lennon, is
suspected of wrongdoing and suspects he is going to be fired from the
company. The problem is that he changed many of the standard
passwords known to only the top executives, and now he is the only one
that knows them. Your company has completed the legal documents
needed to protect you and the company.
With the help of a CorpNet.xyz executive, you were allowed into the IT
Admin's office after hours. You unplugged the keyboard from the back
of the ITAdmin computer and placed a USB keylogger into the USB,
then plugged the USB keyboard into the keylogger. After a week, the
company executive lets you back into the IT Admin's office after hours
again.
In this lab, your task is to use the keylogger to recover the changed
passwords as follows:
Move - Precise Answer ✔✔Solution


Above the computer, select Back to view the back of the computer.


On the back of the computer, drag the USB Type A connector for the
keyboard to another USB port on the computer.

,Make sure to plug the keyboard back in.


On the Shelf, expand System Cases.


Drag the Laptop to the Workspace.


Above the laptop, select Back to view the back of the laptop.


From the computer, drag the keylogger to a USB port on the laptop.


Above the laptop, select Front to view the front of the laptop.


On the laptop, select Click to view Windows 10.
Press S + B + K to toggle from the keylogger mode to the flash drive
mode.


Select Tap to choose what happens with removable drives.


Select Open folder to view files.


Double-click LOG.txt to open the file.


In the top right, select Answer Questions.

,Answer the questions.


Select Score Lab.


Question 1: P@ssw0rd
Question 2: 4Lm87Qde


8.1.5 Analyze a USB keylogger attack 2


Recently, the administrative assistant found a foreign device connected
to the ITAdmin computer while updating some of their hardware. The
device was turned over to you, and you have determined that it is a
keylogger. You need to sift through the information on the keylogger to
find which accounts may be compromised.
In this lab, your task is to determine which corporate accounts have been
compromised as follows:
Plug the keylogger into ITAdmin's USB port.
Use the keyboard combination of SBK to toggle the USB keylogger
from keylogger mode to USB flash drive mode.
Open the LOG.txt file and inspect the contents.
Scan the document for corporate passwords or financial information.
Answer the questions. - Precise Answer ✔✔Solution


1. On the Shelf, expand Storage Devices.

, 2. From the shelf, drag the USB Keylogger to a USB port on ITAdmin.
3. On the monitor, select Click to view Windows 10.
4. Press S + B + K to toggle from the keylogger mode to the flash drive
mode.
5. Select Tap to choose what happens with removable drives.
6. Select Open folder to view files.
7. Double-click LOG.txt to open the file.
8. Maximize the window for easier viewing.
9. In the top right, select Answer Questions.
10. In the file, find which account passwords were captured.
11. In the file, find any compromised financial information.
12. Select Score Lab.


Question 1: email.com, amazon.com
Question 2: 4556358591800117


8.1.7 Crack a password with rainbow tables


While doing some penetration testing for your company, you captured
some password hashes. The password hashes are saved in the root user's
home directory /root/captured_hashes.txt. Now you want to hack these
passwords using a rainbow table. The password requirements for your
company are as follows:
The password must be 25 or more characters in length.
The password must include at least one upper and one lowercase letter.

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
YANCHY Herzing University
Bekijk profiel
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
1739
Lid sinds
3 jaar
Aantal volgers
1159
Documenten
23169
Laatst verkocht
6 uur geleden
Ace Your Exams with Elite Study Resources | ExamEliteHub on Stuvia

I offer genuine and dependable exam papers that are directly obtained from well-known, reputable institutions as a highly regarded professional who specializes in sourcing study materials. These papers are invaluable resources made to help people who want to become nurses and people who work in other fields prepare for exams. Because of my extensive experience and in-depth knowledge of the subject, I take great care to ensure that each exam paper meets the highest quality, accuracy, and relevance standards, making them an essential component of any successful study plan.

Lees meer Lees minder
4.1

447 beoordelingen

5
251
4
58
3
85
2
18
1
35

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen