nerdexam
EC-CouncilEC-Council

312-50V12 · Question #111

312-50V12 Question #111: Real Exam Question with Answer & Explanation

The correct answer is D: Netcat. This question tests knowledge of password cracking tools versus other network utility tools used in penetration testing.

Submitted by joshua94· Mar 4, 2026System Hacking Phases and Attack Techniques

Question

Tony is a penetration tester tasked with performing a penetration test. After gaining initial access to a target system, he finds a list of hashed passwords. Which of the following tools would not be useful for cracking the hashed passwords?

Options

  • AHashcat
  • BJohn the Ripper
  • CTHC-Hydra
  • DNetcat

Explanation

This question tests knowledge of password cracking tools versus other network utility tools used in penetration testing.

Common mistakes.

  • A. Hashcat is a widely-used, GPU-accelerated password recovery tool that supports over 300 hash types and attack modes including dictionary, brute-force, and rule-based attacks, making it highly effective for cracking hashed passwords.
  • B. John the Ripper is a popular open-source password cracking tool that supports numerous hash formats and can perform dictionary, brute-force, and hybrid attacks against offline password hashes.
  • C. THC-Hydra is primarily an online password attack tool used for brute-forcing live authentication services, but it can also be used in credential-based attacks; however, it is less suited for offline hash cracking compared to Hashcat or John the Ripper, it is still associated with password attack toolsets rather than generic network utilities.

Concept tested. Password hash cracking tools identification in pentesting

Reference. https://www.kali.org/tools/hashcat/

Topics

#Password cracking#Hashed passwords#John the Ripper#Hashcat#Netcat

Community Discussion

No community discussion yet for this question.

Full 312-50V12 PracticeBrowse All 312-50V12 Questions