A penetration tester has found indicators that a privileged user's password might be the same on 30 different Linux systems. Which of the following tools can help the tester identify the number of systems on which the password can be used?
A. Hydra
Hydra is a password cracking tool that can help the tester identify the number of systems on which the password can be used. It can perform a dictionary attack, a brute force attack, or a hybrid attack on a target service, such as SSH or telnet, and can attempt to login using a list of provided username and password combinations. This makes it suitable for the scenario where the tester has an indication that a privileged user's password might be the same on multiple systems, as Hydra can be used to try that password on multiple systems in parallel and it can identify which systems are using the same password.
John the Ripper and Medusa are also password cracking tools that can be used to perform dictionary and brute force attacks, but they are not optimized for trying the same password on multiple systems in parallel like Hydra. Cain and Abel is a tool for cracking passwords on Windows systems and not Linux systems, thus it's not suitable for this scenario.
Medusa can search for the same password in multiple systems in parallel. Medusa is a parallelized network login password cracking tool. It can run multiple attacks in parallel, and it can also run the same attack against multiple targets in parallel.
as per Jasson Dion training
Medusa
A parallel brute-force tool that is used against network logins to attack services that support remote authentication
Hydra (correct)
A parallel brute-force tool that also supports a password-inspect module to only attempt passwords from a dictionary that meets the minimum password requirements for a given system
Both Hydra and Medusa support parallel credential stuffing, if the test only wants one answer, Hydra is the best choice because:
More widely used and documented – It’s the go-to tool for brute-force attacks.
Flexible and supports many protocols – Works well for SSH, RDP, FTP, and more.
Easy to use with robust error handling – It has better session management and recovery features compared to Medusa.
However, in real-world testing, Medusa can be faster in some cases due to its superior threading model. If speed was the only concern, Medusa might edge out Hydra. But since the test asks for a single best answer, Hydra is the safer pick.
ChatGPT agrees with option D. lol
Hydra focuses more on the brute-force aspect of password cracking, attempting different combinations of usernames and passwords to gain unauthorized access. However, it may not have built-in features to track and report on which systems accept the same password.
On the other hand, Medusa is specifically designed to perform parallelized brute-force attacks against multiple systems and services simultaneously. It provides more comprehensive reporting and feedback, making it a more suitable tool for identifying the number of systems where the password is valid in this scenario.
Hydra is a network logon cracker that can perform rapid dictionary attacks against various protocols, including SSH (used on Linux systems). In this scenario, Hydra can be used to test the suspected password across multiple Linux systems, helping the penetration tester identify on how many systems the password is valid.
To identify the number of systems on which a password might be the same, a penetration tester can use the following tool:
A. Hydra
Hydra is a versatile password-cracking tool that supports various protocols, including SSH (used for Linux systems) and others. It allows the tester to perform brute-force attacks, dictionary attacks, and other password-guessing techniques. In this scenario, Hydra can be used to attempt the password on multiple Linux systems and identify where it matches, helping to determine the number of systems sharing the same password.
D. Medusa
Medusa is a popular password cracking tool and network login brute-forcer that can help a penetration tester identify the number of systems on which a password can be used. It supports various protocols, including SSH, Telnet, FTP, and more, making it suitable for testing password security on multiple Linux systems.
The correct answer is B. John the Ripper.
John the Ripper is a password cracking tool that can be used to perform password audits and identify weak passwords. It includes a feature called "password reuse detection" that can check whether a password is used on multiple accounts. In this case, the penetration tester can use John the Ripper to test the password against the password hashes on each of the 30 Linux systems to see how many matches are found.
Hydra, Cain and Abel, and Medusa are all password cracking tools as well, but they do not have a built-in feature for password reuse detection. They can still be used to attempt to crack passwords on individual systems, but they would not be as efficient for this specific task as John the Ripper.
To detect password reuse with John the Ripper, you can use the "--fork" and "--rules" options together with the "--show" option. The "--fork" option allows you to run multiple instances of John the Ripper in parallel, while the "--rules" option applies a set of custom word mangling rules to the wordlist. The "--show" option displays cracked passwords.
Here's an example command that detects password reuse for a list of hashed passwords:
john --fork=4 --rules --show hashes.txt
This command runs four instances of John the Ripper in parallel, applies custom word mangling rules to the wordlist, and displays any cracked passwords. You can replace "hashes.txt" with the file containing the hashed passwords.
Base on the below, I'll have to go with Medusa:
"Hydra, a password detection tool which can be used in many situations that includes authentication-based forms which are used in web applications. On the other hand Medusa is a speedy, parallel and modular, login brute forcer that is used to support as many services which allow remote authentication possible"
https://nceca.in/2021/60Comparative_Study_on_Password_Cracking_Tools.pdf
Medusa supports multi-threading which means you could test the password on all 30 systems at the same time rather than doing one after the other as you would with Hydra
The best tool to help the tester identify the number of systems on which the password can be used is Hydra. Hydra is a password-cracking tool specifically designed to identify weak or reused passwords and can be used to test passwords on multiple systems at once. John the Ripper is another popular password-cracking tool, but it is not as well-suited for testing multiple systems. Cain and Abel is a network security auditing tool, and is not suitable for password-cracking. Lastly, Medusa is primarily a network authentication cracking tool, and is not suitable for this purpose.
Medusa is a password cracking tool that can be used for network login password cracking. It can perform brute-force attacks, dictionary attacks, and other types of attacks against various protocols and services. It is designed to be fast and flexible, allowing it to work against multiple hosts at the same time.
In this scenario, the penetration tester can use Medusa to attempt to log in to the 30 Linux systems using the suspected password. Medusa can be configured to run against multiple hosts simultaneously, so the tester can enter the IP addresses or hostnames of the 30 systems and let Medusa run the attack. If the password works on any of the systems, Medusa will report back which systems were successfully accessed.
This section is not available anymore. Please use the main Exam Page.PT0-002 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
RRabbit_111
Highly Voted 2 years, 3 months agocy_analyst
2 years, 1 month ago[Removed]
2 years, 1 month agorob88Silva
Highly Voted 1 year, 1 month agokinny4000
Most Recent 2 months, 3 weeks agoNikamy
5 months, 2 weeks agoj904
1 year agodeeden
1 year, 1 month agodanscbe
1 year, 4 months agoKirby87
1 year, 5 months agosolutionz
1 year, 8 months ago[Removed]
2 years ago[Removed]
2 years agoTheSkyMan
2 years agoAaronS1990
2 years agoKingIT_ENG
2 years, 1 month agonickwen007
2 years, 1 month ago[Removed]
2 years, 1 month ago[Removed]
2 years, 1 month agocy_analyst
2 years, 1 month ago[Removed]
2 years, 1 month ago[Removed]
2 years, 1 month agokloug
2 years, 2 months ago