what kind of attack?
Jack Hacker wants to break into Brown Co.’s computers and obtain their secret double fudge cookie recipe. Jack calls Jane, an accountant at Brown Co., pretending to be an administrator from Brown Co. Jack tells Jane that there has been a problem with some accounts and asks her to tell him her password ‘just to double check our records’. Jane believes that Jack is really an administrator, and tells him her password. Jack now has a user name and password, and can access Brown Co.’s computers, to find the cookie recipe. This is an example of what kind of attack?
What kind of attack is being illustrated here?
Jack Hacker wants to break into company’s computers and obtain their secret double fudge cookie recipe. Jacks calls Jane, an accountant at company pretending to be an administrator from company. Jack tells Jane that there has been a problem with some accounts and asks her to verify her password with him "just to double check our records". Jane does not suspect anything amiss, and parts with her password. Jack can now access company’s computers with a valid user name and password, to steal the cookie recipe.
What kind of attack is being illustrated here? (Choose the best answer)
What is the most common vehicle for social engineering attacks?
What is the most common vehicle for social engineering attacks?
Why is Social Engineering considered attractive by hackers and also adopted by experts in the field?
Why is Social Engineering considered attractive by hackers and also adopted by experts in the field?
Your boss at ABC.com asks you what are the three stages of Reverse Social Engineering.
Your boss at ABC.com asks you what are the three stages of Reverse Social Engineering.
Who are the primary victims of these attacks on the Internet today?
Smurf is a simple attack based on IP spoofing and broadcasts. A single packet (such as an ICMP Echo Request) is sent as a directed broadcast to a subnet on the Internet. All the machines on that subnet respond to this broadcast. By spoofing the source IP Address of the packet, all the responses will get sent to the spoofed IP Address. Thus, a hacker can often flood a victim with hundreds of responses for every request the hacker sends out.
Who are the primary victims of these attacks on the Internet today?
what type of attack is Bryce attempting to perform?
Bryce the bad boy is purposely sending fragmented ICMP packets to a remote target. The tool size of this ICMP packet once reconstructed is over 65,536 bytes. From the information given, what type of attack is Bryce attempting to perform?
Hackers usually control Bots through:
Hackers usually control Bots through:
How do you protect your network against SYN Flood attacks?
The SYN Flood attack sends TCP connections requests faster than a machine can process them.
Attacker creates a random source address for each packet. SYN flag set in each packet is a request to open a new connection to the server from the spoofed IP Address Victim responds to spoofed IP Address then waits for confirmation that never arrives (timeout wait is about 3 minutes) Victim’s connection table fills up waiting for replies and ignores new connection legitimate users are ignored and will not be able to access the server
How do you protect your network against SYN Flood attacks?
What could be the likely cause of this?
Peter has been monitoring his IDS and sees that there are a huge number of ICMP Echo Reply packets that are being received on the External Gateway interface. Further inspection reveals they are not responses from internal hosts request but simply responses coming from the Internet. What could be the likely cause of this?