GIAC GPEN - GIAC Penetration Tester
Which of the following tools can be used for session splicing attacks?
How many bits encryption does SHA-1 use?
LM hash is one of the password schemes that Microsoft LAN Manager and Microsoft Windows versions prior to the Windows Vista use to store user passwords that are less than 15 characters long. If you provide a password seven characters or less, the second half of the LM hash is always __________.
Which of the following tools can be used to find a username from a SID?
Which of the following is a tool for SSH and SSL MITM attacks?
What does APNIC stand for?
Which of the following statements about SSID is NOT true?
Which of the following tools can be used to automate the MITM attack?
Which of the following is a web ripping tool?
What does TCSEC stand for?
