Password Cracking - 2

which hashing algorithm is the weakest out of the following: LM NTLM SHA1 BeCrypt
NTLM
LM
SHA1
BeCrypt
LM
Which account from the following hashdump output is the administrator account on a Windows machine?
Drew:1001:aad3b435b51404eeaad3b435b51404ee:3a0ae9331c2a3d2153bf268aa521a360:::
Neil:1008:aad3b435b51404eeaad3b435b51404ee:3a0ae9331c2a3d2153bf268aa521a360:::
Joe:501:aad3b435b51404eeaad3b435b51404ee:3a0ae9331c2a3d2153bf268aa521a360:::
Daryl:500:aad3b435b51404eeaad3b435b51404ee:3a0ae9331c2a3d2153bf268aa521a360:::
Drew:1001:aad3b435b51404eeaad3b435b51404ee:3a0ae9331c2a3d2153bf268aa521a360:::
Where are passwords stored on a local Windows device
Security Account Manager database (SAM file)
System Access Management database (SAM file)
SYSTEM register
ntds.dit file
Security Account Manager database (SAM file)
Where is the SAM file located
C:\Windows\System32\config
C:\Windows\System32
C:\Windows
C:\Windows\System32\SAM
C:\Windows\System32\config
Based on the following output, what hashing algorithm has been used? CHANGEM
(Stevie:1) E123!
(Stevie:2) "
LM
admin
(Stevie:1) E123!
On what type of device would you attempt to obtain an ntds.dit file
Domain Controller
Member Server
End User Devicde
Firewall
Domain Controller
Which of the following tools will not extract an ntds.dit file?
ntdsutil
crackmapexec
impacket
JTR
JTR
What is the most effective way to protect the ntds.dit file
Using strong passwords for domain admin accounts
create a hidden user account on the domain controller to access the file
implement regular backups to prevent data loss
ensure that all domain controllers are fully patched
Using strong passwords for domain admin accounts
Which of the following is not a feature of the LM hashing algorithm?
Cannot understand special characters
breaks password into two 7 character passwords
Sets all characters to upper case
Cannot store more than 14 characters
Cannot understand special characters
Your Score
Score Label
Score Summary