Questions
Questions

4520_COMP_SCI_X_0006 Quiz 3

Single choice

In a penetration testing scenario, you captured encrypted traffic between a client and a server using Wireshark. You identified the protocol as being SSH. You then used Nmap to identify the version of the SSH server and discovered it was vulnerable to a specific brute-force attack. Using Hydra, you attempted to exploit this vulnerability. Considering this flow, which of the following sequences of filters or commands is most likely accurate?

Options
A.Wireshark: tcp.port == 22, Nmap: -p 22 -sV target_IP, Hydra: -l username -P passlist.txt ssh://target_IP
B.Wireshark: ssh.request, Nmap: -p 22 --version-light target_IP, Hydra: -l username -p password ssh://target_IP
C.Wireshark: tcp.dstport == 23, Nmap: -p 22 -A target_IP, Hydra: -l username -P passlist.txt sftp://target_IP
D.Wireshark: protocol == SSH, Nmap: -p 21 -sV target_IP, Hydra: -u username -list passlist.txt -service ssh target_IP
View Explanation

View Explanation

Verified Answer
Please login to view
Step-by-Step Analysis
First, let's restate the scenario: you captured traffic that was SSH, used Nmap to determine the SSH service version on port 22, and then attempted a brute-force using Hydra with a username list and a password list. We want the sequence of filters/commands that aligns with this flow. Option 1: Wireshark: tcp.port == 22, Nmap: -p 22 -sV target_IP, Hydra: -l username -P passlist.txt ssh://target_IP - This matches the described steps precisely: filter for SSH traffic on port 22 in Wireshark, probe port 2......Login to view full explanation

Log in for full answers

We've collected over 50,000 authentic exam questions and detailed explanations from around the globe. Log in now and get instant access to the answers!

More Practical Tools for Students Powered by AI Study Helper

Join us and instantly unlock extensive past papers & exclusive solutions to get a head start on your studies!