0 of 15 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 15 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
1. For enabling root login, we will give the “sudo su” command.
2. The root login name of Kali Linux is kali.
3. Camphish is used for the hacking of microphones.
4. Setoolkit is used for the hacking of web cameras.
5. The location can be accessed by Storm-Breaker.
6. For root login, there is the ‘$’ prompt.
7. For credential hacking, at the “#” prompt type the word “settoolkit”.
8. We will access Google login and password in the SET attack.
9. For running Camphish, we use bash camphish.sh command.
10. Live Youtube TV comes into the SET attack.
11. When we will start downloading Ngrok, It will ask for the ngrok authtoken.
12. We will use the “sudo bash install.sh “ for the installation of the Camphish.
13. We will use the “sudo python3 st.py” command for the running of the Storm-Breaker.
14. Camphish is used for the hacking of web cameras.
15. Get Normal data is used in the Storm-Breaker, for accessing the location of the user.