· 8 years ago · Nov 22, 2016, 10:46 AM
1Q1 Crack MD5 Hash 098f6bcd4621d373cade4e832627b4f6
2Ans: test
3Q2 Enter the command for OS Detection of 192.168.1.12
4Ans: nmap -o 192.168.1.12
5Q3 Write the nmap command by which a forged packet is created from an interface "eth0", with the source IP as 192.168.1.12, and the target being www.innobuzz.in, with aggressive options enabled.
6Ans: Not Done
7nmap -e eth0 -S 192.168.1.100 192.168.1.109
8Q4 Enter the MD5 hash associated with the SSL certificate of the service at port number 465 in www.innobuzz.in
9Ans: Not Done
103cea063ce1fe0cfe707a09dd256fa23e
11Q5 Download the wireshark data file from here and enter the MAC Address of the computer on IP 192.168.1.13
12Ans: a0:21:b7:9a:e4:cf
13Q6 What is the version of Apache running on the server of www.innobuzz.in? Only enter the version in numerical form (Example: 4.3.23).
14Ans: 2.2.25
15Q7 Enter the Email ID of the IP Admin for the hosting provider of www.innobuzz.in
16Ans: noc@noc4hosts.com
17Q8 Decrypt/Crack the following SHA1 Hash and enter as answer: "57b2ad99044d337197c0c39fd3823568ff81e48a"
18Ans: p@ssw0rd
19Q9 Download the wireshark data file from here and find out the manufacturer of the network card which has been allotted the IP 192.168.1.11
20Ans: NETGEAR