Multiple Choice
Which of the following tools is used to perform a credential brute force attack?
A) Hydra
B) John the Ripper
C) Hashcat
D) Peach
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q124: Which of the following tools would a
Q125: During the exploitation phase of a penetration
Q126: A penetration tester was able to retrieve
Q127: After performing a security assessment for a
Q128: A penetration tester is performing a black
Q130: A company hires a penetration tester to
Q131: A penetration tester has compromised a host.
Q132: A penetration tester has compromised a Windows
Q133: A company performed an annual penetration test
Q134: A client needs to be PCI compliant