Steven examines the following Ethereal capture:
Steven, a security analyst for XYZ associates, is analyzing packets captured by Ethereal on a Linux server inside his network when the server starts to slow down tremendously. Steven examines the following Ethereal capture:
If stealth is not an issue, what type of scan should you run to get very reliable results?
You are performing a port scan with nmap. You are in hurry and conducting the scans at the fastest possible speed. However, you don’t want to sacrifice reliability for speed. If stealth is not an issue, what type of scan should you run to get very reliable results?
What do you think has occurred?
Bryan notices the error on the web page and asks Liza to enter liza’ or ‘1’=’1 in the email field. They are greeted with a message “Your login information has been mailed to johndoe@gmail.com”. What do you think has occurred?
Why is Jim having these problems?
Jim was having no luck performing a penetration test on his company’s network. He was running the test from home and had downloaded every security scanner he could lay his hands on. Despite knowing the IP range of all of the systems, and the exact network configuration, Jim was unable to get any useful results. Why is Jim having these problems?
Which of the following command will help you achieve this?
You are concerned that someone running PortSentry could block your scans, and you decide to slow your scans so that no one detects them. Which of the following command will help you achieve this?
What was used to obtain this output?
While reviewing the results of a scan run against a target network you come across the following:
What was used to obtain this output?
Why would an attacker want to perform a scan on port 137?
Why would an attacker want to perform a scan on port 137?
How is it possible to list processes and uids associated with them in a more reliable manner?
On a backdoored Linux box there is a possibility that legitimate programs are modified or trojaned. How is it possible to list processes and uids associated with them in a more reliable manner?
_____ is found in all versions of NTFS and is described as the ability to fork file data into existing files w
_____ is found in all versions of NTFS and is described as the ability to fork file data into existing files without affecting their functionality, size, or display to traditional file browsing utilities like dir or Windows Explorer
As a security tester, how would you discover what telephone numbers to dial-in to the router?
Wardialing is one of the oldest methods of gaining unauthorized access to the targeted systems, it is one of the dangers most commonly forgotten by network engineers and system administrators. A hacker can sneak past all the expensive firewalls and IDS and connect easily into the network. Through wardialing, an attacker searches for the devices located in the target network infrastructure that are also accessible through the telephone line.
‘Dial backup’ in routers is most frequently found in networks where redundancy is required. Dial-on-demand routing (DDR) is commonly used to establish connectivity as a backup.
As a security tester, how would you discover what telephone numbers to dial-in to the router?
