Steven the hacker realizes that the network administrator of XYZ is using syskey to protect
organization resources in the Windows 2000 Server. Syskey independently encrypts the hashes
so that physical access to the server, tapes, or ERDs is only first step to cracking the passwords.
Steven must break through the encryption used by syskey before he can attempt to brute force
dictionary attacks on the hashes. Steven runs a program called “SysCracker” targeting the
Windows 2000 Server machine in attempting to crack the hash used by Syskey. He needs to
configure the encryption level before he can launch attach.
How many bits does Syskey use for encryption?
A.
40 bit
B.
64 bit
C.
256 bit
D.
128 bit
Explanation:
SYSKEY is a utility that encrypts the hashed password information in a SAM
database using a 128-bit encryption key.
D