What is the most likely cause behind this response?
While performing a ping sweep of a subnet you receive an ICMP reply of Code 3/Type 13 for all
the pings sent out.
What is the most likely cause behind this response?
What can you infer from the above log?
The following excerpt is taken from a honeyput log. The log captures activities across three days.
There are several intrusion attempts; however, a few are successful. Study the log given below
and answer the following question:
(Note: The objective of this questions is to test whether the student has learnt about passive OS
fingerprinting (which should tell them the OS from log captures): can they tell a SQL injection
attack signature; can they infer if a user ID has been created by an attacker and whether they can
read plain source – destination entries from log entries.)
What can you infer from the above log?
what phase is Bob involved with?
Bob has been hired to perform a penetration test on XYZ.com. He begins by looking at IP address
ranges owned by the company and details of domain name registration. He then goes to News
Groups and financial web sites to see if they are leaking any sensitive information of have any
technical details online.
Within the context of penetration testing methodology, what phase is Bob involved with?
Which of the following would be the best reason for sending a single SMTP message to an address that does not
Which of the following would be the best reason for sending a single SMTP message to an
address that does not exist within the target company?
What should be the next logical step that should be performed?
You are conducting a port scan on a subnet that has ICMP blocked. You have discovered 23 live
systems and after scanning each of them you notice that they all show port 21 in closed state.
What should be the next logical step that should be performed?
Which of the following type of scans would be the most accurate and reliable option?
Ann would like to perform a reliable scan against a remote target. She is not concerned about
being stealth at this point.
Which of the following type of scans would be the most accurate and reliable option?
What type of port scan is shown below?
Why would a modem security tester consider using such an old technique?
War dialing is a very old attack and depicted in movies that were made years ago.
Why would a modem security tester consider using such an old technique?
Which kind of scan would you use to achieve this?
You are scanning into the target network for the first time. You find very few conventional ports
open. When you attempt to perform traditional service identification by connecting to the open
ports, it yields either unreliable or no results. You are unsure of which protocols are being used.
You need to discover as many different protocols as possible.
Which kind of scan would you use to achieve this? (Choose the best answer)
What are two types of ICMP code used when using the ping command?
What are two types of ICMP code used when using the ping command?