Exam PT0-002 All QuestionsBrowse all questions from this exam
Question 156

A penetration tester wants to test a list of common passwords against the SSH daemon on a network device. Which of the following tools would be BEST to use for this purpose?

    Correct Answer: C

    To test a list of common passwords against the SSH daemon on a network device, the best tool to use is Patator. Patator is a versatile and multi-purpose brute-force tool designed to automate the process of attempting to log in using a variety of user-supplied passwords. It supports various network protocols, including SSH, which makes it specifically suitable for the task of testing passwords against SSH services.

Discussion
NotAHackerJustYetOption: C

The correct answer is C. Patator. C. Patator is a multi-purpose tool for brute-forcing, particularly for testing a list of common passwords against an SSH daemon on a network device. It is designed to automate the process of attempting to log in using a variety of user-supplied passwords. This makes it the best tool for this purpose.

NotAHackerJustYet

A. Hashcat is a tool used for password cracking and recovery. It is designed to find weak passwords through brute-force attack. However, it is not the best tool for testing a list of common passwords against an SSH daemon on a network device, as it is not designed for this purpose. B. Mimikatz is a post-exploitation tool that can be used to gather credentials from various sources. It is not the best tool for testing a list of common passwords against an SSH daemon on a network device, as it is not designed for this purpose. D. John the Ripper is a password-cracking tool that can be used to crack passwords quickly and efficiently. It is not the best tool for testing a list of common passwords against an SSH daemon on a network device, as it is not designed for this purpose.

cy_analystOption: C

Patator is a multi-purpose brute-forcer, which can be used for various tasks, such as testing passwords against various protocols and services, including SSH. It supports many protocols and services, including HTTP, FTP, SSH, Telnet, SMTP, and many more.

[Removed]

Yes C is correct

beamageOption: C

The Books says Patator for SSH ftp,smb,vnc,zip

BABrendanOption: C

ChatGPT says C. He says that John the Ripper and Hashcat (while good..his words not mine) are not used for live attacks while Patator is.

nickwen007Option: C

Patator is a powerful brute-force tool that can be used to automate tests such as password guessing and authentication bypass. It can also be used to test the strength of passwords, perform dictionary attacks, and more.

kloug

cccccccc

mj944Option: C

https://www.kali.org/tools/patator/

Treebeard88

Patator is a brute force tool, does not utilize a wordlist of common passwords against a service or host - https://www.kali.org/tools/patator/#:~:text=Patator%20is%20a%20multi%2Dpurpose,telnet_login%20%3A%20Brute%2Dforce%20Telnet Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage. Currently it supports the following modules: ftp_login : Brute-force FTP ssh_login : Brute-force SSH telnet_login : Brute-force Telnet There is no wordlist module on the kali tools page

kmanb

This is straight from my Kali machine: As you can see below you can pass in a wordlist file in the password parameter for the ssh_login module. kali@kali:~$ patator ssh_login --help Patator 0.9 (https://github.com/lanjelot/patator) with python-3.9.2 Usage: ssh_login <module-options ...> [global-options ...] Examples: ssh_login host=10.0.0.1 user=root password=FILE0 0=passwords.txt -x ignore:mesg='Authentication failed.'

solutionzOption: C

For the specific task of testing a list of common passwords against the SSH daemon on a network device, you would want to use a tool designed to perform brute-force attacks on network services like SSH. Among the options provided, the best tool for this task is: C. Patator Patator is a versatile brute-force tool that supports various network protocols, including SSH. It can be used to attempt to authenticate using a list of usernames and passwords, making it suitable for the task described.

nickwen007Option: D

The best answer is D. Deconfliction is necessary when the penetration test proceeds in parallel with a criminal digital forensic investigation.

masso435Option: C

I mean C not D.

Treebeard88Option: A

From the Hashcat website - https://hashcat.net/wiki/ Core Attack Methods Dictionary attack - trying all words in a list; also called “straight” mode (attack mode 0, -a 0) Combinator attack - concatenating words from multiple wordlists (-a 1)

Etc_Shadow28000Option: C

C. Patator Explanation: • Patator: Patator is a versatile brute-force tool that supports various protocols, including SSH. It allows testers to attempt multiple passwords against an SSH service efficiently and flexibly. Patator is specifically designed for scenarios like this, where you need to automate login attempts.

masso435Option: D

Hashcat and John the Ripper are both offline tools. Patator can be used for network attacks on services such as SSH.