How would you describe a simple yet very effective mechanism for sending and receiving unauthorized informatio
How would you describe a simple yet very effective mechanism for sending and receiving unauthorized information or data between machines without alerting any firewalls and IDS’s on a network?
Why did the capturing of traffic take much less time on the wireless network?
Steven is a senior security analyst for a state agency in Tulsa, Oklahoma. His agency is currently undergoing a mandated security audit by an outside consulting firm. The consulting firm is halfway through the audit and is preparing to perform the actual penetration testing against the agency’s network. The firm first sets up a sniffer on the agency’s wired network to capture a reasonable amount of traffic to analyze later. This takes approximately 2 hours to obtain 10 GB of data. The consulting firm then sets up a sniffer on the agency’s wireless network to capture the same amount of traffic.This capture only takes about 30 minutes to get 10 GB of data.
Why did the capturing of traffic take much less time on the wireless network?
What operating system is the target host running based on the open ports shown above?
You have initiated an active operating system fingerprinting attempt with nmap against a target system:root@ceh NG]# /usr/local/bin/nmap -sT -O 10.0.0.1
Starting nmap 3.28 ( www.insecure.org/nmap/) at 2003-06-18 19:14 IDT nteresting ports on 10.0.0.1:
The 1628 ports scanned but not shown below are in state: closed) Port State Service
21/tcp filtered ftp
2/tcp filtered ssh
5/tcp open smtp
0/tcp open http
35/tcp open loc-srv
39/tcp open netbios-ssn
89/tcp open LDAP
43/tcp open https
65/tcp open smtps
029/tcp open ms-lsa
433/tcp open ms-sql-s
301/tcp open compaqdiag
555/tcp open freeciv
800/tcp open vnc-http
900/tcp open vnc
000/tcp filtered X11
Remote operating system guess: Windows XP, Windows 2000, NT4 or 95/98/98SE map run completed — 1 IP address (1 host up) scanned in 3.334 seconds
Using its fingerprinting tests nmap is unable to distinguish between different groups of Microsoft based operating systems – Windows XP, Windows 2000, NT4 or 95/98/98SE. What operating system is the target host running based on the open ports shown above?
What method of attack is best suited to crack these passwords in the shortest amount of time?
Frederickson Security Consultants is currently conducting a security audit on the networks of Hawthorn Enterprises, a contractor for the Department of Defense. Since Hawthorn Enterprises conducts business daily with the federal government, they must abide by very stringent security policies. Frederickson is testing all of Hawthorn’s physical and logical security measures including biometrics, passwords, and permissions.
The federal government requires that all users must utilize random, non-dictionary passwords that must take at least 30 days to crack. Frederickson has confirmed that all Hawthorn employees use a random password generator for their network passwords. The Frederickson consultants have saved off numerous SAM files from Hawthorn’s servers using Pwdump6 and are going to try and crack the network passwords.
What method of attack is best suited to crack these passwords in the shortest amount of time?
What does the following command in netcat do?
What does the following command in netcat do?
nc 55555 < /etc/passwd
Which of the following Exclusive OR transforms bits is NOT correct?
Which of the following Exclusive OR transforms bits is NOT correct?
What would be the best countermeasure to protect against such escalation?
Once an intruder has access to a remote system with a valid username and password, the attacker will attempt to increase his privileges by escalating the compromised account to one having increased privileges, such as that of an administrator. What would be the best countermeasure to protect against such escalation?
Which of the following is an attack in which a secret value like a hash is captured and then reused at a later
Which of the following is an attack in which a secret value like a hash is captured and then reused at a later time to gain access to a system without ever decrypting or decoding the hash.
What do you think is the reason behind this?
In an attempt to secure his wireless network, Bob implements a VPN to cover the wireless communications he is using in his office. Soon after the implementation, users begin complaining about the wireless network slowing down. After benchmarking the network’s speed, Bob discovers that throughput has dropped by almost half, even though the number of users has remained the same. What do you think is the reason behind this?
Which of the following attacks takes best advantage of an existing authenticated connection
Which of the following attacks takes best advantage of an existing authenticated connection