What hacking attack is challenge/response authentication used to prevent?
What hacking attack is challenge/response authentication used to prevent?
What port number is used by LDAP protocol?
What port number is used by LDAP protocol?
What is the next step to be done?
You are conducting pen-test against a company’s website using SQL Injection techniques. You enter “anything’ or 1=1 ” in the username field of an authentication form. This is the output returned from the server.
What is the next step to be done?
To which category does this virus belong?
Melissa is a virus that targeted Microsoft Windows platforms. To which category does this virus belong?
What would be your inference?
Eric notices repeated probes to port 1080. He learns that the protocol being used is designed to allow a host outside of a firewall to connect transparently and securely through the firewall. He wonders if his firewall has been breached. What would be your inference?
Why do you think this is possible?
Annie has just succeeded in stealing a secure cookie via a XSS attack. She is able to replay the cookie even while the session is valid on the server. Why do you think this is possible?
Assuming an attacker wants to penetrate John's network, which of the following options is he likely to ch
John has a proxy server on his network which caches and filters web access. He shuts down all unnecessary ports and services. Additionally, he has installed a firewall (Cisco PIX) that will not allow users to connect to any outbound ports. Jack, a network user has successfully connected to a remote server on port 80 using netcat. He could in turn drop a shell from the remote machine. Assuming an attacker wants to penetrate John’s network, which of the following options is he likely to choose?
One of the most common and the best way of cracking RSA encryption is to begin to derive the two prime numbers
One of the most common and the best way of cracking RSA encryption is to begin to derive the two prime numbers, which are used in the RSA PKI mathematical process. If the two numbers p and q are discovered through a _____________ process, then the private key can be derived.
Microsoft Authenticode technology is used for:
Microsoft Authenticode technology is used for:
What is the probable cause of Bill's problem?
Bill has successfully executed a buffer overflow against a Windows IIS web server. He has been able to spawn an interactive shell and plans to deface the main web page. He first attempts to use the “Echo” command to simply overwrite index.html and remains unsuccessful. He then attempts to delete the page and achieves no progress. Finally, he tries to overwrite it with another page in which also he remains unsuccessful. What is the probable cause of Bill’s problem?