Which attack creates a new alphabet from 2- to 3-character syllables derived from passwords to match against the password database?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which attack creates a new alphabet from 2- to 3-character syllables derived from passwords to match against the password database?

Explanation:
Markov-chain password guessing models how characters tend to follow one another in real passwords. It analyzes a training set of passwords and builds a statistical model that treats 2- to 3-character chunks as usable units (syllables). This creates a new alphabet of those syllables and the transitions between them. When generating guesses, the attacker walks through this model in proportion to the learned probabilities, producing password candidates that look like real user choices rather than random strings. This approach is efficient because it concentrates effort on the most likely sequences, especially when the training data resembles the target population. Fingerprint attacks rely on biometric data, which aren’t about password construction. Combinator attacks splice together words from dictionaries but don’t model sequential character dependencies. The PRINCE approach uses rule-based mutations and combinations rather than building an n-gram–based model of short syllables.

Markov-chain password guessing models how characters tend to follow one another in real passwords. It analyzes a training set of passwords and builds a statistical model that treats 2- to 3-character chunks as usable units (syllables). This creates a new alphabet of those syllables and the transitions between them. When generating guesses, the attacker walks through this model in proportion to the learned probabilities, producing password candidates that look like real user choices rather than random strings. This approach is efficient because it concentrates effort on the most likely sequences, especially when the training data resembles the target population.

Fingerprint attacks rely on biometric data, which aren’t about password construction. Combinator attacks splice together words from dictionaries but don’t model sequential character dependencies. The PRINCE approach uses rule-based mutations and combinations rather than building an n-gram–based model of short syllables.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy