exam questions

Exam PT0-002 All Questions

View all questions & answers for the PT0-002 exam

Exam PT0-002 topic 1 question 64 discussion

Actual exam question from CompTIA's PT0-002
Question #: 64
Topic #: 1
[All PT0-002 Questions]

A penetration tester runs the unshadow command on a machine.
Which of the following tools will the tester most likely use NEXT?

  • A. John the Ripper
  • B. Hydra
  • C. Mimikatz
  • D. Cain and Abel
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
RRabbit_111
Highly Voted 9 months, 1 week ago
A. John the Ripper Explanation: The unshadow command is used to combine the /etc/passwd and /etc/shadow files on a Linux or Unix system, creating a single file that contains all of the user information, including password hashes. This file can then be used to crack the passwords using a password cracking tool such as John the Ripper. John the Ripper is a popular password cracking tool that uses a variety of methods to try and guess the password, including dictionary attacks, brute force attacks, and rule-based attacks. Once the tester has the unshadowed file, they will use John the Ripper to crack the password on the machine. B.Hydra, C. Mimikatz and D. Cain and Abel are also password cracking tools but they are not typically used after running the unshadow command.
upvoted 6 times
...
Mr_BuCk3th34D
Highly Voted 10 months, 1 week ago
The unshadow command will basically combine the data of /etc/passwd and /etc/shadow to create 1 file with username and password details for John The Ripper tool.
upvoted 5 times
...
nickwen007
Most Recent 7 months, 2 weeks ago
The dirb utility is a command line tool used to scan directories and detect potential web application vulnerabilities. It can be used to find files, vulnerabilities, and webpages that are not linked or otherwise accessible from the main webpages. It is typically used for penetration testing in order to gain access to systems and uncover security flaws.
upvoted 1 times
...
nickwen007
7 months, 2 weeks ago
The unshadow command is a Linux command used to combine two separate files containing account information from a Unix system. It combines the passwd and shadow files, which contain encrypted passwords and user accounts respectively, into one file, which can be used in password cracking operations. The unshadow command is typically used in pentesting operations to gain access to systems.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago