Podcast
Questions and Answers
What is a 'man in the middle' attack?
What is a 'man in the middle' attack?
- An attack where the pirate changes the destination address of the packet
- An attack where the pirate destroys data in the packet
- An attack where the pirate puts their machine as the source address of the packet
- An attack where the pirate intercepts communication between two machines (correct)
What is the main difference between an active and a passive attack?
What is the main difference between an active and a passive attack?
- Passive attacks attempt to alter system resources or destroy data
- Passive attacks are more about monitoring and recognition of the target (correct)
- Active attacks attempt to gain information without destroying it
- Active attacks are simpler than passive attacks
Which tool is used for man in the middle attacks on a LAN?
Which tool is used for man in the middle attacks on a LAN?
- Wireshark
- Hping
- Ettercap (correct)
- Nmap
What is the primary function of Hping?
What is the primary function of Hping?
In which type of attack does the attacker change the data in the packet?
In which type of attack does the attacker change the data in the packet?
Which type of scanning involves attempting to gain information without altering it?
Which type of scanning involves attempting to gain information without altering it?
How can a word 'hello' be sent to the socat listener listening on port 123?
How can a word 'hello' be sent to the socat listener listening on port 123?
What does the -v option signify when starting a web server with Socat?
What does the -v option signify when starting a web server with Socat?
Which tool is a Unix-based port redirection tool written by Todd Vierling?
Which tool is a Unix-based port redirection tool written by Todd Vierling?
What feature does Fpipe have that Datapipe lacks?
What feature does Fpipe have that Datapipe lacks?
What is the primary function of Amap in vulnerability scanning?
What is the primary function of Amap in vulnerability scanning?
Which command in Socat is used for file transfer to a specific IP address and port?
Which command in Socat is used for file transfer to a specific IP address and port?
What type of traffic does a port redirection tool pass from one port to another?
What type of traffic does a port redirection tool pass from one port to another?
In which mode does THC - Amap just grab banners without sending triggers?
In which mode does THC - Amap just grab banners without sending triggers?
What is the main purpose of TCPDUMP in network analysis?
What is the main purpose of TCPDUMP in network analysis?
What is the role of most port scanners when a specific port is found to be open?
What is the role of most port scanners when a specific port is found to be open?
Which mode of THC - Amap functions as a full connect port scanner?
Which mode of THC - Amap functions as a full connect port scanner?
How does Amap determine what is running on a specific port?
How does Amap determine what is running on a specific port?