Windows 10
This command line tool is used for traffic analysis
Tshark
This account has the highest privilege in Linux
Root account (superuser)
An advantage of this pentest type is that it provides the most comprehensive coverage of vulnerabilities
White-box
In steghide, -cf means this
Cover file
Each layer in a packet has it's own address and is read by different processes much like a complex _______
Mailing process
A user's account is used inappropriately, fraudulently, maliciously, accidentally, or through willful ignorance of policies
Privilege abuse
Two steps within the pentest methodology that are only followed by ethical hackers
Pre-engagement and Reporting
When you use this option on S-tool, you'll be prompted to enter a passphrase
Reveal
What is a MAC address?
It is an ID unique to a piece of hardware
This password cracking method uses an additional file which contains a list of words
Dictionary attack
The flag "-A" in Nmap combines several of these features (give two features)
Host discovery, OS detection, open/closed ports, service version detection
192.168.217.3 is the IP that belongs to which virtual machine in the bootcamp environment?
Attacker Kali
At which layer in a packet is the IP address located
The internet layer
We use this command to decrypt a wifi traffic file
Airdecap-ng
Metasploit is owned by this Boston based security company
Rapid7