Question 42: A hacker attempted to determine your password algorithm by capturing the text and hash to determine the key. What type of attack has been executed?

Question 42: A hacker attempted to determine your password algorithm by capturing the text and hash to determine the key. What type of attack has been executed?
By Steve Fullmer and Mike Danseglio
BUY NOW $495
Buy for Teams
Video Courses > CompTIA Security+ Certification Video Course
Module 1: CompTIA Security + Certification Requirements
Module 2: Risk components and Terms
Solve ALE
5:37
Module 3: Maximum Tolerable Downtime (MTD) Model
Module 4: Basic Security Terms and Categories
Attacks
8:51
Module 5: Defense in Depth Model
Module 6: Basic Data States
Module 7: Authentication Models
Module 8: Security Authorization Techniques
Module 9: Common Account Management Controls
Module 10: Federation Examples
Module 11: Cryptographic Standards
Module 12: Cryptographic Attacks
Module 13: Certification Hierarchy Elements and Interactions
Module 14: Kerberos Authentication Process
Module 15: Windows OS Components and Processes
Module 16: System and Software Attacks
Module 17: System Controls
TCB
2:35
Hardening
7:44
Logging
3:03
Module 18: New Software Development Models
Module 19: Secure Coding Techniques
Module 20: Embedded Systems and Special Considerations
SCADA
2:15
IOT
1:52
Module 21: Virtualization
Module 22: Basic Network Terminology
Layer 4
4:14
Module 23: Network Attack Surfaces
Module 24: Ports Most Susceptible to Attack
DNS Ports
2:50
DHCP
2:26
SSH
5:44
SNMP
3:09
RTP/RTPS
3:54
Module 25: VPN and Remote Access Methods
VPN
4:16
IPSEC
4:19
Module 26: Common Password Elements
NTLM
3:26
PAP/CHAP
5:32
Module 27: Network Attacks
Hijacking
6:13
Module 28: Wireless Attack Surfaces
Module 29: Wireless Attacks
Module 30: Basic Network Controls
DMZ
3:42
Honeypots
2:51
Module 31: Site Survey and Recommend Facility Device Placement
Module 32: Mobile Device Security Controls
Module 33: Unique Mobile Device Issues
Module 34: Cloud Environments and Controls
Module 35: Identify and Use Basic Security Tools
Module 36: Operational Security Frameworks
Module 37: Physical Security Elements
Module 38: Specialized Physical Controls
Man Traps
5:12
Module 39: Human Factor Issues
Humanity
5:17
Module 40: Forensic Practices
Module 41: Organizational Recovery Programs
View Entire Course

Question 42: A hacker attempted to determine your password algorithm by capturing the text and hash to determine the key. What type of attack has been executed?