You have been given the task of assessing the strength of authentication methods on a client's server. To conduct your analysis, you choose a popular brute-force tool. With the server's IP address being '192.168.1.50' and having lists of potential usernames and passwords named 'users.txt' and 'passwords.txt', respectively, determine the correct syntax to initiate the brute-force process against the secure remote login protocol.
The correct answer is Medusa -h 192.168.1.50 -U users.txt -P passwords.txt -M ssh. This is because the '-h' flag specifies the target host's IP address, '-U' designates the file that contains potential usernames, and '-P' indicates the file with potential passwords. Finally, '-M' is used to define the type of service or protocol to attack, in this case, the secure remote login protocol typically associated with port 22. The incorrect answers suggest syntax that either does not correctly define the parameters for this protocol or uses invalid or nonexistent flags for the Medusa command-line syntax.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the key components of the Medusa command syntax?
Open an interactive chat with Bash
What is a brute-force attack and why is it used?
Open an interactive chat with Bash
Why is it important to specify the protocol when using Medusa for brute-force attacks?