Which definition among those given below best describes a covert channel?
Which definition among those given below best describes a covert channel?
What has William just installed?
William has received a Chess game from someone in his computer programming class through
email. William does not really know the person who sent the game very well, but decides to install
the game anyway because he really likes Chess.
After William installs the game, he plays it for a couple of hours. The next day, William plays the
Chess game again and notices that his machine has begun to slow down. He brings up his Task
Manager and sees the following programs running:
What has William just installed?
What kind of attack is Susan carrying on?
Susan has attached to her company’s network. She has managed to synchronize her boss’s
sessions with that of the file server. She then intercepted his traffic destined for the server,
changed it the way she wanted to and then placed it on the server in his home directory. What
kind of attack is Susan carrying on?
What is the destination MAC address of a broadcast frame?
John the hacker is sniffing the network to inject ARP packets. He injects broadcast frames onto
the wire to conduct MiTM attack. What is the destination MAC address of a broadcast frame?
What would you call this attack?
Eric has discovered a fantastic package of tools named Dsniff on the Internet. He has learnt to use
these tools in his lab and is now ready for real world exploitation. He was able to effectively
intercept communications between the two entities and establish credentials with both sides of the
connections. The two remote ends of the communication never notice that Eric is relaying the
information between the two.
What would you call this attack?
How can this help you in foot printing the organization?
You are gathering competitive intelligence on an organization. You notice that they have jobs
listed on a few Internet job-hunting sites. There are two jobs for network and system
administrators. How can this help you in foot printing the organization?
What is Eve trying to do?
Eve is spending her day scanning the library computers. She notices that Alice is using a
computer whose port 445 is active and listening. Eve uses the ENUM tool to enumerate Alice
machine. From the command prompt, she types the following command.
For /f “tokens=1 %%a in (hackfile.txt) do net use * \\10.1.2.3\c$ /user:”Administrator” %%a
What is Eve trying to do?
which of the following bit set?
TCP packets transmitted in either direction after the initial three-way handshake will have which of
the following bit set?
Which of the following represents the initial two commands that an IRC client sends to join an IRC network?
Which of the following represents the initial two commands that an IRC client sends to join an IRC
network?
Identify the line in the source code that might lead to buffer overflow?
The programmers on your team are analyzing the free, open source software being used to run
FTP services on a server in your organization. They notice that there is excessive number of
functions in the source code that might lead to buffer overflow. These C++ functions do not check
bounds. Identify the line in the source code that might lead to buffer overflow?