which location, SAM hash passwords are stored in Windows 7?
In which location, SAM hash passwords are stored in Windows 7?
How would you disable file extensions in Apache servers?
File extensions provide information regarding the underlying server technology. Attackers can use
this information to search vulnerabilities and launch attacks. How would you disable file extensions
in Apache servers?
What is a good example of a programming error that Bob can use to explain to the management how encryption wil
Bob has a good understanding of cryptography, having worked with it for many years.
Cryptography is used to secure data from specific threats, but it does not secure the application
from coding errors. It can provide data privacy; integrity and enable strong authentication but it
cannot mitigate programming errors. What is a good example of a programming error that Bob can
use to explain to the management how encryption will not address all their security concerns?
What defensive measures will you take to protect your network from these attacks?
Finding tools to run dictionary and brute forcing attacks against FTP and Web servers is an easy
task for hackers. They use tools such as arhontus or brutus to break into remote servers.
A command such as this, will attack a given 10.0.0.34 FTP and Telnet servers simultaneously with
a list of passwords and a single login namE. linksys. Many FTP-specific password-guessing tools
are also available from major security sites.
What defensive measures will you take to protect your network from these attacks?
If the two numbers p and q are discovered through a _____________ process, then the private key can be derived
One of the most common and the best way of cracking RSA encryption is to begin to derive the
two prime numbers, which are used in the RSA PKI mathematical process. If the two numbers p
and q are discovered through a _____________ process, then the private key can be derived.
Data is sent over the network as clear text (unencrypted) when Basic Authentication is configured on Web Serve
Data is sent over the network as clear text (unencrypted) when Basic Authentication is configured
on Web Servers.
Which port does SMB over TCP/IP use?
NetBIOS over TCP/IP allows files and/or printers to be shared over the network. You are trying to
intercept the traffic from a victim machine to a corporate network printer. You are attempting to
hijack the printer network connection from your laptop by sniffing the wire. Which port does SMB
over TCP/IP use?
Why Only 13 hosts send a reply while others do not?
One of the ways to map a targeted network for live hosts is by sending an ICMP ECHO request to
the broadcast or the network address. The request would be broadcasted to all hosts on the
targeted network. The live hosts will send an ICMP ECHO Reply to the attacker’s source IP
address.
You send a ping request to the broadcast address 192.168.5.255.
There are 40 computers up and running on the target network. Only 13 hosts send a reply while
others do not. Why?
What command can Charlie use to attempt this task?
Charlie is the network administrator for his company. Charlie just received a new Cisco router and
wants to test its capabilities out and to see if it might be susceptible to a DoS attack resulting in its
locking up. The IP address of the Cisco switch is 172.16.0.45. What command can Charlie use to
attempt this task?
What type of encryption does WPA2 use?
What type of encryption does WPA2 use?