Multiple Choice
A consultant is attempting to harvest credentials from unsecure network protocols in use by the organization. Which of the following commands should the consultant use?
A) tcpdump
B) john
C) hashcat
D) nc
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q147: A penetration tester is reviewing a Zigbee
Q148: In which of the following scenarios would
Q149: Which of the following can be used
Q150: A penetration tester has successfully deployed an
Q151: A client's systems administrator requests a copy
Q153: Which of the following vulnerabilities are MOST
Q154: A penetration tester is preparing to conduct
Q155: A penetration tester successfully exploits a DMZ
Q156: The following command is run on a
Q157: A penetration tester discovers an anonymous FTP