adplus-dvertising
frame-decoration

Question

Which Metasploit modules are used for testing SSH credentials?

a.

ssh_bruteforce and ssh_dictionary

b.

ssh_login and ssh_login_pubkey

c.

ssh_crack and ssh_spraying

d.

ssh_attack and ssh_hashcrack

Answer: (b).ssh_login and ssh_login_pubkey Explanation:Metasploit modules like ssh_login and ssh_login_pubkey can be used to test SSH credentials across a network range or list of possible target systems.

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Which Metasploit modules are used for testing SSH credentials?

Similar Questions

Discover Related MCQs

Q. What is a dictionary attack?

Q. What is the main advantage of hash cracking attacks?

Q. What is the characteristic of password spraying attacks?

Q. What is stress testing, and why is it included in penetration tests?

Q. What precautions should penetration testers take when conducting stress testing?

Q. What types of stress testing tools are included in Kali Linux?

Q. What is eavesdropping in the context of wireless networks?

Q. What do data modification attacks attempt to achieve in wireless exploits?

Q. What is the focus of data corruption attacks in wireless networks?

Q. What is a relay attack in the context of wireless exploits?

Q. How do spoofing attacks work in wireless networks?

Q. What is the purpose of deauthentication attacks in wireless exploits?

Q. How does jamming impact wireless networks?

Q. What role do captive portals play in wireless networks?

Q. What does the hack-captiveportals tool in Kali Linux do?

Q. What is the primary purpose of Evil Twin attacks in wireless networks?

Q. How can penetration testers use Aircrack-ng to perform Evil Twin attacks?

Q. What is the purpose of conducting deauthentication attacks in Evil Twin scenarios?

Q. How does EAPHammer differ from Aircrack-ng in conducting Evil Twin attacks?

Q. How is an Evil Twin different from a rogue access point?