How can he use it?

A hacker has managed to gain access to a Linux host and stolen the password file from /etc/passwd. How can he use it?
A. The password file does not contain the passwords themselves.
B. He can open it and read the user ids and corresponding passwords.
C. The file reveals the passwords to the root user only.
D. He cannot read it because it is encrypted.

EC-Council Certified Ethical Hacker v11

Free dumps for 312-50v11 in Printable PDF format.

High quality PDF and software. VALID exam to help you pass.

Download Printable PDF. VALID exam to help you PASS.

7 thoughts on “How can he use it?

  1. From what i read it, the password is reflected with X… And we know that the password can be found in /etc/shadow folder… the X means it is encrypted… No?

  2. Brian is right. Correct answer is A.

    /etc/passwd contains entries like:
    root:!:0:0::/:/usr/bin/ksh
    daemon:!:1:1::/etc:
    bin:!:2:2::/bin:

    /etc/shadow contains the hashes like:
    root:salt:hash

  3. The Answer is A

    etc/shadow is where passwords are stored.

    A. The password file does not contain the passwords themselves.

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.