adplus-dvertising
frame-decoration

Question

As part of a penetration test Mariana uses a tool that uses the same username and password from a list on many target systems and then uses the next username and password from its list. Which of the following terms best describes the attack she is using?

a.

Brute force

b.

Dictionary

c.

Hash cracking

d.

Password spraying

Answer: (d).Password spraying Explanation:Mariana is conducting a password spraying attack. Password spraying attacks use the same credentials against many systems, then try the next credential pairing. Hash cracking attempts to identify the original password that resulted in a given captured hash. Dictionary attacks use a word list along with a set of rules to modify those words to attempt a brute-force attack. A brute-force attack involves repeated tries using an algorithm or process to attempt to log in. When a question like this has multiple potentially correct answers, remember to answer with the most specific answer rather than a broad answer.

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. As part of a penetration test Mariana uses a tool that uses the same username and password from a list on many target systems and then uses the next username and password from its...

Similar Questions

Discover Related MCQs

Q. Steve has set his penetration testing workstation up for an on-path attack between his target and an FTP server. What is the best method for him to acquire FTP credentials?

Q. Ian wants to drop a tool on a compromised system that will allow him to set up a reverse shell. Which of the following tools should he select?

Q. What drives the use of deauthentication attacks during penetration tests?

Q. Which of the following tools will not allow Alice to capture NTLM v2 hashes over the wire for use in a pass-the-hash attack?

Q. For what type of activity would you use the tools HULK, LOIC, HOIC, and SlowLoris?

Q. During a penetration test, Mike uses double tagging to send traffic to another system. What technique is he attempting?

Q. Elle is using her workstation as part of an on-path attack as shown in the following image. What does she need to send at point X to ensure that the downgrade attack works properly?

Q. Isaac wants to use arpspoof to execute an on-path attack between target host 10.0.1.5 and a server at 10.0.1.25, with a network gateway of 10.0.1.1. What commands does he need to run to do this?

Q. Jessica wants to list the domain password policy for a Windows domain as she prepares for a password attack against domain member systems. What net command can she use to do this?

Q. Cynthia attempted a DNS poisoning attack as shown here. After her attempt, she does not see any traffic from her target system. What most likely happened to cause the attack to fail?

Q. Elle wants to clone an RFID entry access card. Which type of card is most easily cloned using inexpensive cloning devices?