100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
TESTOUT ETHICAL HACKER PRO LABS (MODULES 8-15) EXAM 2025 $16.49   Add to cart

Exam (elaborations)

TESTOUT ETHICAL HACKER PRO LABS (MODULES 8-15) EXAM 2025

 2 views  0 purchase
  • Course
  • TESTOUT ETHICAL HACKER PRO LABS
  • Institution
  • TESTOUT ETHICAL HACKER PRO LABS

TESTOUT ETHICAL HACKER PRO LABS (MODULES 8-15) EXAM 2025

Preview 4 out of 43  pages

  • November 17, 2024
  • 43
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • TESTOUT ETHICAL HACKER PRO LABS
  • TESTOUT ETHICAL HACKER PRO LABS
avatar-seller
YANCHY
TESTOUT ETHICAL HACKER PRO LABS (MODULES 8-15)
EXAM 2025



8.1.4 Analyze a USB keylogger attack


The CEO of CorpNet.xyz has hired your firm to obtain some passwords
for their company. A senior IT network administrator, Oliver Lennon, is
suspected of wrongdoing and suspects he is going to be fired from the
company. The problem is that he changed many of the standard
passwords known to only the top executives, and now he is the only one
that knows them. Your company has completed the legal documents
needed to protect you and the company.
With the help of a CorpNet.xyz executive, you were allowed into the IT
Admin's office after hours. You unplugged the keyboard from the back
of the ITAdmin computer and placed a USB keylogger into the USB,
then plugged the USB keyboard into the keylogger. After a week, the
company executive lets you back into the IT Admin's office after hours
again.
In this lab, your task is to use the keylogger to recover the changed
passwords as follows:
Move - Precise Answer ✔✔Solution


Above the computer, select Back to view the back of the computer.


On the back of the computer, drag the USB Type A connector for the
keyboard to another USB port on the computer.

,Make sure to plug the keyboard back in.


On the Shelf, expand System Cases.


Drag the Laptop to the Workspace.


Above the laptop, select Back to view the back of the laptop.


From the computer, drag the keylogger to a USB port on the laptop.


Above the laptop, select Front to view the front of the laptop.


On the laptop, select Click to view Windows 10.
Press S + B + K to toggle from the keylogger mode to the flash drive
mode.


Select Tap to choose what happens with removable drives.


Select Open folder to view files.


Double-click LOG.txt to open the file.


In the top right, select Answer Questions.

,Answer the questions.


Select Score Lab.


Question 1: P@ssw0rd
Question 2: 4Lm87Qde


8.1.5 Analyze a USB keylogger attack 2


Recently, the administrative assistant found a foreign device connected
to the ITAdmin computer while updating some of their hardware. The
device was turned over to you, and you have determined that it is a
keylogger. You need to sift through the information on the keylogger to
find which accounts may be compromised.
In this lab, your task is to determine which corporate accounts have been
compromised as follows:
Plug the keylogger into ITAdmin's USB port.
Use the keyboard combination of SBK to toggle the USB keylogger
from keylogger mode to USB flash drive mode.
Open the LOG.txt file and inspect the contents.
Scan the document for corporate passwords or financial information.
Answer the questions. - Precise Answer ✔✔Solution


1. On the Shelf, expand Storage Devices.

, 2. From the shelf, drag the USB Keylogger to a USB port on ITAdmin.
3. On the monitor, select Click to view Windows 10.
4. Press S + B + K to toggle from the keylogger mode to the flash drive
mode.
5. Select Tap to choose what happens with removable drives.
6. Select Open folder to view files.
7. Double-click LOG.txt to open the file.
8. Maximize the window for easier viewing.
9. In the top right, select Answer Questions.
10. In the file, find which account passwords were captured.
11. In the file, find any compromised financial information.
12. Select Score Lab.


Question 1: email.com, amazon.com
Question 2: 4556358591800117


8.1.7 Crack a password with rainbow tables


While doing some penetration testing for your company, you captured
some password hashes. The password hashes are saved in the root user's
home directory /root/captured_hashes.txt. Now you want to hack these
passwords using a rainbow table. The password requirements for your
company are as follows:
The password must be 25 or more characters in length.
The password must include at least one upper and one lowercase letter.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller YANCHY. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $16.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75759 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$16.49
  • (0)
  Add to cart