PrepAway - Latest Free Exam Questions & Answers

Tag: enumeration ceh v6 site:aiotestking com

Choose the attack type from the choices given below.

Bill is attempting a series of SQL queries in order to map out the tables within the database that he is trying to exploit. Choose the attack type from the choices given below.

What is Eve trying to do?

Eve is spending her day scanning the library computers. She notices that Alice is using a computer whose port 445 is active and listening. Eve uses the ENUM tool to enumerate Alice’s machine. From the command prompt, she types the following command.
For /f okens=1 %%a in (hackfile.txt) do net use * \10.1.2.3c$ /user:dministrator?%%a
What is Eve trying to do?