Questions for the GSEC were updated on : Nov 21 ,2025
Use sudo to launch Snort with the, /etc /snort /snort.conf file In full mode to generate alerts based
on incoming traffic to echo. What is the source IP address of the traffic triggering an alert with a
destination port of 156?
Note: Snort Is configured to exit after It evaluates 50 packets.

I
Using PowerShell ISE running as an Administrator, navigate to the
C:\hlindows\security\tevplatesdirectory
. Use secedit.exe in analyze mode to compare the temp.sdb
and uorkstdtionSecureTmplate.inf files, and output the findings to a file called log.txt. Which
configuration setting under Analyze User Rights reports a mismatch?
Hints:
Use files located in the C \windows\security\templates\ directory
The log. txt file will be created in the directory the secedit.exe command is run from

J
Launch Calculator (calc.exe). Using PowerShell, retrieve the Calculator Process Information. What is
the value of the File Version property?
Hint: The process name of Calculator is calculator

F
In the directory
C:\lmages\steer
there Is an Image file lmage_4240.png with a data string encoded
inside the file. What word is hidden in the file?

B.
Use PowerShell ISE to
examineC:\Windows\security\templates\WorkstationSecureTemplate.inf.
Which
setting
is
configured in the template?

A
What is the SHA1 hash of the Ale /bin/Is?

G
Open the MATE terminal and use the tcpdump program to read - /pcaps /cass tech.pcap.
What is the source port number?

E
Use Hashcat to crack a local shadow file. What Is the password for the user account AGainsboro?
Hints
Hints
• The shadow file (shadow) and Hashcat wordlist (gsecwordlist.txt) are located in the directory.
home giac PasswordHashing
- Run Hashcat in straight mod* (flag -a 0) to crack the MD5 hashes (flag -m 500) in the shadow file.
• Use the hash values from the Hashcat output file and the shadow file to match the cracked
password with the user name.
• If required, a backup copy of the original files can be found in the shadowbackup directory.
D
Use Hashcat to crack a local shadow file. What Is the password for the user account AGainsboro?
Hints
• The shadow file (shadow) and Hashcat wordlist (gsecwordlist.txt) are located in the directory
/home /giac /PasswordHashing/
• Run Hashcat in straight mode (flag -a 0) to crack the MD5 hashes (flag -m 500) In the shadow file.
• Use the hash values from the Hashcat output file and the shadow file to match the cracked
password with the user name.
• If required, a backup copy of the original files can be found in the shadowbackup directory.

E
Use nmap to discover a host on the 10.10.10.0/24 network, scanning only port 8082 and using the
SYN or Stealth scan approach. Which host has a service called -blackice-alerts"?

F
Use Wireshark to analyze Desktop;PCAP FILES/charile.pcap
What is the destination IP address in packet #3?

F
Which of the following attacks can be mitigated by avoiding making system calls from within a web
application?
B, C
Which of the following is an example of a BitLocker recovery password?
B
Which of the following is Azure's version of a superuser?
B
Which asymmetric algorithm is used only for key exchange?
B