Crack the password of the protected.zip file as follows:From the top navigation tabs, select Floor 1 Overview.Under IT Administration, select IT-Laptop.From the Favorites bar, open Terminal.At the prompt, type ls and press Enter to view the contents of the home directory. john/john.pot and press Enter to view the contents of the john.pot file.Type john /etc/shadow -show and press Enter as an alternate method of viewing the previously cracked password.In the top right, select Answer Questions.In Terminal, find the root password and answer the question. The cracked password is already stored in the john.pot file.Type cat. This is an abbreviated list.Type cd and press Enter to go back to root.Type john /etc/shadow and press Enter to crack the Linux passwords.Notice that the root password of 1worm4b8 was cracked.Type john /etc/shadow and press Enter to attempt to crack the Linux passwords again.Notice that it does not attempt to crack the password again.
![testout pc pro certification test quizlet testout pc pro certification test quizlet](https://www.voucherplex.com/whawheeh/2018/04/pcproimage-768x611.jpg)
Extract the data and open the file as follows:Under Data Hiding, select Extract Data.In the Input Stego File field, select the ellipses.Select send.png file with the encryption.Select Open.In the Output Folder for Message File field, select the ellipses.Double-click Export to set it as the destination of the output the file.Click Select Folder.In the Password field, enter as the password.Select Extract Data.Select OK.From the taskbar, open File Explorer.Double-click Documents to navigate to the folder.Double-click Export to navigate to the folder.Double-click John.txt to open the output file and verify that the decryption process was successful.Ĭomplete this lab as follows: Crack the root password on Support as follows:From the Favorites bar, open Terminal.At the prompt, type cd /usr/share/john and press Enter to change directories to the folder containing the John the Ripper password file.Type ls and press Enter to list the files in the directory.Type cat password.lst and press Enter to view the password list. Password protect the file as follows:In the Password field, enter the Confirm Password field, enter Hide Data.Select OK. Answer the questions.Ĭomplete this lab as follows: Encrypt the user data into the file to be shared as follows:In the search field on the taskbar, type OpenStego.Under Best match, select OpenStego.In the Message File field, select the ellipses at the end of the field.Select Open.In the Cover File field, select the ellipses at the end of the field.Select gear.png file.Select Open.In the Output Stego File field, select the ellipses at the end of the field.In the File name field, enter Open. Find the Administrator account's password. Open the LOG.txt file and inspect the contents. Use the SBK key combination to toggle the USB keylogger from keylogger mode to USB flash drive mode. Plug the keylogger into the consultant laptop's USB drive. Move the consultant laptop from the Shelf to the Workspace. In this lab, your task is to use the keylogger to recover the changed passwords as follows: Move the keyboard USB connector to a different USB port on ITAdmin. After a week, the company executive lets you back into the IT Admin's office after hours again. You unplugged the keyboard from the back of the ITAdmin computer and placed a USB keylogger into the USB, then plugged the USB keyboard into the keylogger. With the help of a CorpNet.xyz executive, you were allowed into the IT Admin's office after hours. Your company has completed the legal documents needed to protect you and the company.
![testout pc pro certification test quizlet testout pc pro certification test quizlet](https://assets-global.website-files.com/5f5fed325c80f64c94a2ed68/600f1c9114f2b6427f21416f_pro-certs.png)
The problem is that he changed many of the standard passwords known to only the top executives, and now he is the only one that knows them. A senior IT network administrator, Oliver Lennon, is suspected of wrongdoing and suspects he is going to be fired from the company. The CEO of CorpNet.xyz has hired your firm to obtain some passwords for their company.