Matt is conducting a penetration test against a Linux server and successfully gained access to an administrative account. He would now like to obtain the password hashes for use in a brute-force attack. Where is he likely to find the hashes, assuming the system is configured to modern security standards?

A. /etc/passwd
B. /etc/hash
C. /etc/secure
D. /etc/shadow

Answer: D. /etc/shadow

Computer Science & Information Technology

You might also like to view...

In a database, relationships are formed between ________ based on common fields

A) tables B) queries C) reports D) forms

Computer Science & Information Technology

To ________ means to decompress, or pull out, files from a compressed form

Fill in the blank(s) with correct word

Computer Science & Information Technology