Matt is conducting a penetration test against a Linux server and successfully gained access to an administrative account. He would now like to obtain the password hashes for use in a brute-force attack. Where is he likely to find the hashes, assuming the system is configured to modern security standards?
A. /etc/passwd
B. /etc/hash
C. /etc/secure
D. /etc/shadow
Answer: D. /etc/shadow
Computer Science & Information Technology
You might also like to view...
In a database, relationships are formed between ________ based on common fields
A) tables B) queries C) reports D) forms
Computer Science & Information Technology
To ________ means to decompress, or pull out, files from a compressed form
Fill in the blank(s) with correct word
Computer Science & Information Technology