Podcast
Questions and Answers
The time a hacker spends performing research to locate information about a company is known as?
The time a hacker spends performing research to locate information about a company is known as?
What is the type of cloud attack that can be performed by exploiting the vulnerability discussed?
What is the type of cloud attack that can be performed by exploiting the vulnerability discussed?
What tool did John use to scan for IoT devices using default credentials?
What tool did John use to scan for IoT devices using default credentials?
This is likely a failure in which security process related to the Equifax data breach?
This is likely a failure in which security process related to the Equifax data breach?
Signup and view all the answers
Which Nmap option must Shiela use to perform service version discovery?
Which Nmap option must Shiela use to perform service version discovery?
Signup and view all the answers
Which host discovery technique must Andrew use to discover active devices hidden by a restrictive firewall?
Which host discovery technique must Andrew use to discover active devices hidden by a restrictive firewall?
Signup and view all the answers
What useful information is gathered during a successful Simple Mail Transfer Protocol (SMTP) enumeration?
What useful information is gathered during a successful Simple Mail Transfer Protocol (SMTP) enumeration?
Signup and view all the answers
What type of attack did Bob perform on Kate by exploiting her phone's loudspeaker?
What type of attack did Bob perform on Kate by exploiting her phone's loudspeaker?
Signup and view all the answers
Which type of attack can Mary implement to continue with her test after finding password hashes?
Which type of attack can Mary implement to continue with her test after finding password hashes?
Signup and view all the answers
What type of footprinting technique did Richard employ?
What type of footprinting technique did Richard employ?
Signup and view all the answers
Which anonymizer helps George hide his activities?
Which anonymizer helps George hide his activities?
Signup and view all the answers
Which wireless security protocol replaces PSK authentication with Simultaneous Authentication of Equals (SAE)?
Which wireless security protocol replaces PSK authentication with Simultaneous Authentication of Equals (SAE)?
Signup and view all the answers
What is the first step a bank should take before enabling the audit feature?
What is the first step a bank should take before enabling the audit feature?
Signup and view all the answers
Which tool did Lewis use to gather information about IoT devices connected to a network?
Which tool did Lewis use to gather information about IoT devices connected to a network?
Signup and view all the answers
Which type of MIB is accessed by Garry to manage networked devices?
Which type of MIB is accessed by Garry to manage networked devices?
Signup and view all the answers
Which component of the Web Service Architecture did Rebecca use for securing communication?
Which component of the Web Service Architecture did Rebecca use for securing communication?
Signup and view all the answers
Which rootkit adds code and/or replaces some of the operating-system kernel code to obscure a backdoor on a system?
Which rootkit adds code and/or replaces some of the operating-system kernel code to obscure a backdoor on a system?
Signup and view all the answers
Mirai malware targets IoT devices and is used to launch which types of attack?
Mirai malware targets IoT devices and is used to launch which types of attack?
Signup and view all the answers
What type of action did James perform as part of the vulnerability assessment?
What type of action did James perform as part of the vulnerability assessment?
Signup and view all the answers
What Google dork operator would you use to footprint a site and only show results that show file extensions?
What Google dork operator would you use to footprint a site and only show results that show file extensions?
Signup and view all the answers
Which stage of the cyber kill chain are you at if you are testing user awareness using employees’ emails?
Which stage of the cyber kill chain are you at if you are testing user awareness using employees’ emails?
Signup and view all the answers
Which of the following advanced operators would restrict a Google search to an organization’s web domain?
Which of the following advanced operators would restrict a Google search to an organization’s web domain?
Signup and view all the answers
Which attack technique did John use to remain undetected in a network and obtain sensitive information?
Which attack technique did John use to remain undetected in a network and obtain sensitive information?
Signup and view all the answers
What type of cloud attack did Alice perform by infiltrating the target’s MSP provider?
What type of cloud attack did Alice perform by infiltrating the target’s MSP provider?
Signup and view all the answers
What type of vulnerability assessment was performed by Johnson when he hardended the internal network?
What type of vulnerability assessment was performed by Johnson when he hardended the internal network?
Signup and view all the answers
What service runs on port 389, requiring immediate action to tackle?
What service runs on port 389, requiring immediate action to tackle?
Signup and view all the answers
What type of attack was Richard performing when he captured and replayed command sequences in an IoT network?
What type of attack was Richard performing when he captured and replayed command sequences in an IoT network?
Signup and view all the answers
Which type of MIB is accessed by Garry for managing networked devices?
Which type of MIB is accessed by Garry for managing networked devices?
Signup and view all the answers
What encryption algorithm uses 64-bit blocks of data and three 56-bit keys?
What encryption algorithm uses 64-bit blocks of data and three 56-bit keys?
Signup and view all the answers
What type of malware are systems infected with if users are experiencing slowdowns and pop-up ads?
What type of malware are systems infected with if users are experiencing slowdowns and pop-up ads?
Signup and view all the answers
What NetBIOS code is used for obtaining the messenger service running for a logged-in user?
What NetBIOS code is used for obtaining the messenger service running for a logged-in user?
Signup and view all the answers
What information security control creates an isolated environment for hackers while gathering information?
What information security control creates an isolated environment for hackers while gathering information?
Signup and view all the answers
What attack technique did Ralph use while masquerading as a customer support executive?
What attack technique did Ralph use while masquerading as a customer support executive?
Signup and view all the answers
What is the fastest way to perform content enumeration on a web server using the Gobuster tool?
What is the fastest way to perform content enumeration on a web server using the Gobuster tool?
Signup and view all the answers
What attack did Bobby perform by installing a fake communication tower?
What attack did Bobby perform by installing a fake communication tower?
Signup and view all the answers
What firewall evasion scanning technique uses a zombie system?
What firewall evasion scanning technique uses a zombie system?
Signup and view all the answers
What type of attack is characterized by code injection like 'char buff; buff = 'a';'?
What type of attack is characterized by code injection like 'char buff; buff = 'a';'?
Signup and view all the answers
What technique did Steve use to redirect the company's web traffic to a malicious site?
What technique did Steve use to redirect the company's web traffic to a malicious site?
Signup and view all the answers
In the NIST cloud deployment architecture, what category does a telecom company providing Internet connectivity fall into?
In the NIST cloud deployment architecture, what category does a telecom company providing Internet connectivity fall into?
Signup and view all the answers
What countermeasure must be implemented to secure user accounts on a web server?
What countermeasure must be implemented to secure user accounts on a web server?
Signup and view all the answers
What type of attack did Clark perform on Steven after he enabled iTunes Wi-Fi sync?
What type of attack did Clark perform on Steven after he enabled iTunes Wi-Fi sync?
Signup and view all the answers
What attack did Boney perform by sending a session ID using an MITM attack technique?
What attack did Boney perform by sending a session ID using an MITM attack technique?
Signup and view all the answers
What technique is discussed regarding scanning vulnerable machines to create a botnet?
What technique is discussed regarding scanning vulnerable machines to create a botnet?
Signup and view all the answers
What is the attack called when an adversary tricks a victim into reinstalling an already-in-use key?
What is the attack called when an adversary tricks a victim into reinstalling an already-in-use key?
Signup and view all the answers
Which Nmap command helped Jim retrieve information about Ethernet/IP devices?
Which Nmap command helped Jim retrieve information about Ethernet/IP devices?
Signup and view all the answers
What type of attack is Joe experiencing when the website appears different and non-secure?
What type of attack is Joe experiencing when the website appears different and non-secure?
Signup and view all the answers
What TTL value indicates that a target OS is Windows?
What TTL value indicates that a target OS is Windows?
Signup and view all the answers
Which of the following tools must the organization employ to protect its critical infrastructure?
Which of the following tools must the organization employ to protect its critical infrastructure?
Signup and view all the answers
What attack was performed on Don after installing a deceptive gaming app?
What attack was performed on Don after installing a deceptive gaming app?
Signup and view all the answers
What is this cloud deployment option called when a customer joins with a group of users to share a cloud environment?
What is this cloud deployment option called when a customer joins with a group of users to share a cloud environment?
Signup and view all the answers
What online tool did Clark employ to gather information about a competitor's server IP address?
What online tool did Clark employ to gather information about a competitor's server IP address?
Signup and view all the answers
What type of vulnerability assessment tool was employed by John while scanning for vulnerabilities?
What type of vulnerability assessment tool was employed by John while scanning for vulnerabilities?
Signup and view all the answers
Which of the following Metasploit post-exploitation modules can be used to escalate privileges on Windows systems?
Which of the following Metasploit post-exploitation modules can be used to escalate privileges on Windows systems?
Signup and view all the answers
What type of alert is logged when the external router is accessed correctly?
What type of alert is logged when the external router is accessed correctly?
Signup and view all the answers
Which among the following is the best example of the third step (delivery) in the cyber kill chain?
Which among the following is the best example of the third step (delivery) in the cyber kill chain?
Signup and view all the answers
What type of attack is Ricardo attempting by using a list of common passwords?
What type of attack is Ricardo attempting by using a list of common passwords?
Signup and view all the answers
Which type of attack attempts to overflow the content-addressable memory (CAM) table in an Ethernet switch?
Which type of attack attempts to overflow the content-addressable memory (CAM) table in an Ethernet switch?
Signup and view all the answers
Which type of malware spreads from one system to another and causes similar types of damage as viruses do?
Which type of malware spreads from one system to another and causes similar types of damage as viruses do?
Signup and view all the answers
What type of attack involves redirecting victims through malicious links?
What type of attack involves redirecting victims through malicious links?
Signup and view all the answers
In ethical hacking methodology, infecting a system with malware is part of which phase?
In ethical hacking methodology, infecting a system with malware is part of which phase?
Signup and view all the answers
What is the type of spyware that Jake used to infect the target device?
What is the type of spyware that Jake used to infect the target device?
Signup and view all the answers
Which regional Internet registry should Becky go to for detailed information about the IP allocated to a location in Le Havre, France?
Which regional Internet registry should Becky go to for detailed information about the IP allocated to a location in Le Havre, France?
Signup and view all the answers
How do you keep your wireless network undiscoverable to outsiders?
How do you keep your wireless network undiscoverable to outsiders?
Signup and view all the answers
What key does Bob use to encrypt the checksum for ensuring message integrity?
What key does Bob use to encrypt the checksum for ensuring message integrity?
Signup and view all the answers
What APT lifecycle phase is occurring when Harry deploys malware to create an outbound connection?
What APT lifecycle phase is occurring when Harry deploys malware to create an outbound connection?
Signup and view all the answers
In CVSS v3.1, what range does medium vulnerability fall into?
In CVSS v3.1, what range does medium vulnerability fall into?
Signup and view all the answers
What type of virus is most likely to remain undetected by antivirus software?
What type of virus is most likely to remain undetected by antivirus software?
Signup and view all the answers
What keys does Alice use to encrypt and Bryan use to confirm the digital signature?
What keys does Alice use to encrypt and Bryan use to confirm the digital signature?
Signup and view all the answers
What is the best example of a scareware attack?
What is the best example of a scareware attack?
Signup and view all the answers
Which Nmap switch helps evade IDS or firewalls?
Which Nmap switch helps evade IDS or firewalls?
Signup and view all the answers
What will you call the two vulnerabilities discovered that are found to be untrue?
What will you call the two vulnerabilities discovered that are found to be untrue?
Signup and view all the answers
What attack occurs when partial HTTP requests are sent to take down web infrastructure?
What attack occurs when partial HTTP requests are sent to take down web infrastructure?
Signup and view all the answers
What is the first step followed by Vulnerability Scanners for scanning a network?
What is the first step followed by Vulnerability Scanners for scanning a network?
Signup and view all the answers
What algorithm is employed by Harper to secure the email messages?
What algorithm is employed by Harper to secure the email messages?
Signup and view all the answers
What information-gathering technique does using the sV flag with Nmap best describe?
What information-gathering technique does using the sV flag with Nmap best describe?
Signup and view all the answers
What is the type of injection attack Calvin's web application is susceptible to?
What is the type of injection attack Calvin's web application is susceptible to?
Signup and view all the answers
What two SQL injection types could Jane use to test responses for a user ID?
What two SQL injection types could Jane use to test responses for a user ID?
Signup and view all the answers
What vulnerability could be exploited on the 'Brakeme-Internal' wireless network with WPA3?
What vulnerability could be exploited on the 'Brakeme-Internal' wireless network with WPA3?
Signup and view all the answers
Which of the following tactics uses malicious code to redirect users' web traffic?
Which of the following tactics uses malicious code to redirect users' web traffic?
Signup and view all the answers
What is the tool employed by Mason to spread Emotet malware?
What is the tool employed by Mason to spread Emotet malware?
Signup and view all the answers
What service runs directly on TCP port 445 that Lawrence enumerated?
What service runs directly on TCP port 445 that Lawrence enumerated?
Signup and view all the answers
Based on the SQL credentials provided, what command is expected to be executed if the SQL injection is successful?
Based on the SQL credentials provided, what command is expected to be executed if the SQL injection is successful?
Signup and view all the answers
What is the technique employed by Kevin to improve the security of encryption keys?
What is the technique employed by Kevin to improve the security of encryption keys?
Signup and view all the answers
What tool did John use to gather information from the LDAP service?
What tool did John use to gather information from the LDAP service?
Signup and view all the answers
What is the API vulnerability revealed in the above scenario?
What is the API vulnerability revealed in the above scenario?
Signup and view all the answers
Which tool did Taylor employ to monitor and analyze her company’s website traffic?
Which tool did Taylor employ to monitor and analyze her company’s website traffic?
Signup and view all the answers
Which of the following techniques is employed by Dayn to detect honeypots?
Which of the following techniques is employed by Dayn to detect honeypots?
Signup and view all the answers
How would you identify whether someone is performing an ARP spoofing attack on your laptop?
How would you identify whether someone is performing an ARP spoofing attack on your laptop?
Signup and view all the answers
What is the enumeration technique used by Henry on the organization?
What is the enumeration technique used by Henry on the organization?
Signup and view all the answers
What technique is used by Jack to launch the fileless malware on the target systems?
What technique is used by Jack to launch the fileless malware on the target systems?
Signup and view all the answers
What technique employed by Eric secures cloud resources?
What technique employed by Eric secures cloud resources?
Signup and view all the answers
What command-line parameter could you use to determine the type and version number of the web server?
What command-line parameter could you use to determine the type and version number of the web server?
Signup and view all the answers
What is the technique used by Jacob to improve the security of the mobile application?
What is the technique used by Jacob to improve the security of the mobile application?
Signup and view all the answers
Which of the following web vulnerabilities would an attacker be attempting to exploit if they delivered the following input ']'?
Which of the following web vulnerabilities would an attacker be attempting to exploit if they delivered the following input ']'?
Signup and view all the answers
What is the attack technique employed by the attacker to crack the passwords of industrial control systems?
What is the attack technique employed by the attacker to crack the passwords of industrial control systems?
Signup and view all the answers
Which of the following advanced operators would allow the pen tester to restrict the search to the organization's web domain?
Which of the following advanced operators would allow the pen tester to restrict the search to the organization's web domain?
Signup and view all the answers
Which of the following algorithms includes all features Tony wants to integrate into his software program?
Which of the following algorithms includes all features Tony wants to integrate into his software program?
Signup and view all the answers
What is the technique employed by Steve to gather information for identity theft?
What is the technique employed by Steve to gather information for identity theft?
Signup and view all the answers
What is the cloud technology employed by Alex in the above scenario?
What is the cloud technology employed by Alex in the above scenario?
Signup and view all the answers
Which type of fault injection attack is performed by Robert in the above scenario?
Which type of fault injection attack is performed by Robert in the above scenario?
Signup and view all the answers
Which of the following master components is explained in the above scenario?
Which of the following master components is explained in the above scenario?
Signup and view all the answers
What tool is employed by Clark to create the spoofed email?
What tool is employed by Clark to create the spoofed email?
Signup and view all the answers
What can you say about Bob's conclusion regarding DMZ?
What can you say about Bob's conclusion regarding DMZ?
Signup and view all the answers
What is the tool employed by Miley to perform the ARP spoofing attack?
What is the tool employed by Miley to perform the ARP spoofing attack?
Signup and view all the answers
What is the command used for in the given SQL injection scenario?
What is the command used for in the given SQL injection scenario?
Signup and view all the answers
What is the OS running on the target machine based on the given TTL and TCP window size?
What is the OS running on the target machine based on the given TTL and TCP window size?
Signup and view all the answers
Which countermeasures must Larry implement to secure the user accounts on the web server?
Which countermeasures must Larry implement to secure the user accounts on the web server?
Signup and view all the answers
What type of threat intelligence collected by Arnold in the above scenario?
What type of threat intelligence collected by Arnold in the above scenario?
Signup and view all the answers
What would John be considered as for examining the vulnerability privately?
What would John be considered as for examining the vulnerability privately?
Signup and view all the answers
What is web server footprinting?
What is web server footprinting?
Signup and view all the answers
Which tool is used by Jack to perform vulnerability scanning?
Which tool is used by Jack to perform vulnerability scanning?
Signup and view all the answers
What type of attack was performed on Ben's smartphone in the above scenario?
What type of attack was performed on Ben's smartphone in the above scenario?
Signup and view all the answers
Which web-page file type is a strong indication of vulnerability to a Server-Side Includes attack?
Which web-page file type is a strong indication of vulnerability to a Server-Side Includes attack?
Signup and view all the answers
What is this hacking process known as when hackers are roaming around to find a wireless network?
What is this hacking process known as when hackers are roaming around to find a wireless network?
Signup and view all the answers
Identify the correct sequence of steps involved in vulnerability management.
Identify the correct sequence of steps involved in vulnerability management.
Signup and view all the answers
What type of vulnerability assessment did Jude perform?
What type of vulnerability assessment did Jude perform?
Signup and view all the answers
Which type of SQL injection attack extends the results returned by the original query?
Which type of SQL injection attack extends the results returned by the original query?
Signup and view all the answers
Which design flaw in the authentication mechanism is exploited by Calvin?
Which design flaw in the authentication mechanism is exploited by Calvin?
Signup and view all the answers
What is the Wi-Fi encryption technology implemented by Debry Inc.?
What is the Wi-Fi encryption technology implemented by Debry Inc.?
Signup and view all the answers
Which attack technique is used by Stella to compromise the web services?
Which attack technique is used by Stella to compromise the web services?
Signup and view all the answers
What technique is described in the above scenario regarding Louis's actions?
What technique is described in the above scenario regarding Louis's actions?
Signup and view all the answers
What is the tool employed by Gerard in the above scenario?
What is the tool employed by Gerard in the above scenario?
Signup and view all the answers
What is the first step for a hacker conducting a DNS cache poisoning attack against an organization?
What is the first step for a hacker conducting a DNS cache poisoning attack against an organization?
Signup and view all the answers
What countermeasure is the company using to protect against rainbow tables?
What countermeasure is the company using to protect against rainbow tables?
Signup and view all the answers
What is the file that determines the basic configuration in an Android application?
What is the file that determines the basic configuration in an Android application?
Signup and view all the answers
Which of the following techniques is described in the above scenario?
Which of the following techniques is described in the above scenario?
Signup and view all the answers
Which of the following protocols can be used to secure an LDAP service against anonymous queries?
Which of the following protocols can be used to secure an LDAP service against anonymous queries?
Signup and view all the answers
At what stage of the cyber kill chain theory model does data exfiltration occur?
At what stage of the cyber kill chain theory model does data exfiltration occur?
Signup and view all the answers
Which file do you have to clean to clear the password after performing a penetration test?
Which file do you have to clean to clear the password after performing a penetration test?
Signup and view all the answers
What is the social engineering technique Steve employed in the above scenario?
What is the social engineering technique Steve employed in the above scenario?
Signup and view all the answers
What is the port to block first in case you are suspicious that an IoT device has been compromised?
What is the port to block first in case you are suspicious that an IoT device has been compromised?
Signup and view all the answers
What is the attack technique employed by Jane in the above scenario?
What is the attack technique employed by Jane in the above scenario?
Signup and view all the answers
What is the technique used by Kevin to evade the IDS system?
What is the technique used by Kevin to evade the IDS system?
Signup and view all the answers
What is the CVSS severity level of the vulnerability discovered by Sam in the above scenario?
What is the CVSS severity level of the vulnerability discovered by Sam in the above scenario?
Signup and view all the answers
What should John do to communicate correctly using PGP?
What should John do to communicate correctly using PGP?
Signup and view all the answers
What type of vulnerability assessment did Morris perform on the target organization?
What type of vulnerability assessment did Morris perform on the target organization?
Signup and view all the answers
Which of the following host discovery techniques must Andrew use?
Which of the following host discovery techniques must Andrew use?
Signup and view all the answers
Which type of solution is Heather using?
Which type of solution is Heather using?
Signup and view all the answers
What flag will you use to satisfy the requirement in Nmap for the scan?
What flag will you use to satisfy the requirement in Nmap for the scan?
Signup and view all the answers
Which file is a rich target during web-server footprinting?
Which file is a rich target during web-server footprinting?
Signup and view all the answers
What type of malware did the attacker use to bypass the company’s application whitelisting?
What type of malware did the attacker use to bypass the company’s application whitelisting?
Signup and view all the answers
What is the correct way of using MSFvenom to generate a reverse TCP shellcode for Windows?
What is the correct way of using MSFvenom to generate a reverse TCP shellcode for Windows?
Signup and view all the answers
Which of the following attacks can be performed by exploiting the SSLv2 vulnerability?
Which of the following attacks can be performed by exploiting the SSLv2 vulnerability?
Signup and view all the answers
If you send a TCP ACK segment to a known closed port on a firewall but it does not respond with an RST, what do you know about the firewall?
If you send a TCP ACK segment to a known closed port on a firewall but it does not respond with an RST, what do you know about the firewall?
Signup and view all the answers
What is the port scanning technique used by Sam to discover open ports?
What is the port scanning technique used by Sam to discover open ports?
Signup and view all the answers
What is the type of web-service API mentioned in the above scenario?
What is the type of web-service API mentioned in the above scenario?
Signup and view all the answers
Which type of SQL injection leverages a database server’s ability to make DNS requests to pass data to an attacker?
Which type of SQL injection leverages a database server’s ability to make DNS requests to pass data to an attacker?
Signup and view all the answers
On which of the following ports should Robin run the NSTX tool?
On which of the following ports should Robin run the NSTX tool?
Signup and view all the answers
Which iOS jailbreaking technique patches the kernel during the device boot?
Which iOS jailbreaking technique patches the kernel during the device boot?
Signup and view all the answers
What is the component of the Docker architecture used by Annie?
What is the component of the Docker architecture used by Annie?
Signup and view all the answers
What is the technique used by Sam to compromise AWS IAM credentials?
What is the technique used by Sam to compromise AWS IAM credentials?
Signup and view all the answers
Which of the following attacks did Abel perform in the above scenario?
Which of the following attacks did Abel perform in the above scenario?
Signup and view all the answers
What attack has likely occurred on Jane's wireless network?
What attack has likely occurred on Jane's wireless network?
Signup and view all the answers
Which phase of the vulnerability-management life cycle is David currently in?
Which phase of the vulnerability-management life cycle is David currently in?
Signup and view all the answers
What issue occurred for the users who clicked on the image?
What issue occurred for the users who clicked on the image?
Signup and view all the answers
What type of footprinting technique is employed by Richard?
What type of footprinting technique is employed by Richard?
Signup and view all the answers
Which of the following commands checks for valid users on an SMTP server?
Which of the following commands checks for valid users on an SMTP server?
Signup and view all the answers
What most likely happened to Matt regarding his Facebook interaction?
What most likely happened to Matt regarding his Facebook interaction?
Signup and view all the answers
Which of the following tools is used by Wilson in the above scenario?
Which of the following tools is used by Wilson in the above scenario?
Signup and view all the answers
Which of the following tools did Bob employ to gather information about an IoT device?
Which of the following tools did Bob employ to gather information about an IoT device?
Signup and view all the answers
What type of hacker is Nicolas?
What type of hacker is Nicolas?
Signup and view all the answers
What social engineering technique did Steve employ in the above scenario?
What social engineering technique did Steve employ in the above scenario?
Signup and view all the answers
What is the name of the attack mentioned in the scenario?
What is the name of the attack mentioned in the scenario?
Signup and view all the answers
What is the incident handling and response phase in which Robert has determined the issues?
What is the incident handling and response phase in which Robert has determined the issues?
Signup and view all the answers
What is the best Linux pipe to achieve grabbing all the links from the main page?
What is the best Linux pipe to achieve grabbing all the links from the main page?
Signup and view all the answers
What evasion technique did Daniel use in his SQL injection attempt?
What evasion technique did Daniel use in his SQL injection attempt?
Signup and view all the answers
What type of attack did Jason perform in the above scenario?
What type of attack did Jason perform in the above scenario?
Signup and view all the answers
What is the common name for a vulnerability disclosure program opened by companies?
What is the common name for a vulnerability disclosure program opened by companies?
Signup and view all the answers
What is the tool employed by James?
What is the tool employed by James?
Signup and view all the answers
Which wireless security protocol allows 192-bit minimum-strength security protocols?
Which wireless security protocol allows 192-bit minimum-strength security protocols?
Signup and view all the answers
What attack did Robin perform in the above scenario?
What attack did Robin perform in the above scenario?
Signup and view all the answers
What protocol is being used in the unencrypted traffic discovered at UDP port 161?
What protocol is being used in the unencrypted traffic discovered at UDP port 161?
Signup and view all the answers
What short-range wireless communication technology did George employ?
What short-range wireless communication technology did George employ?
Signup and view all the answers
Which regulation is mostly violated in the case of exposed medical records?
Which regulation is mostly violated in the case of exposed medical records?
Signup and view all the answers
What type of vulnerability assessment did Martin perform?
What type of vulnerability assessment did Martin perform?
Signup and view all the answers
What kind of attack is possible in the above scenario?
What kind of attack is possible in the above scenario?
Signup and view all the answers
What type of attack performed by Samuel is depicted in the above scenario?
What type of attack performed by Samuel is depicted in the above scenario?
Signup and view all the answers
What tests would you perform to determine if a computer is infected?
What tests would you perform to determine if a computer is infected?
Signup and view all the answers
What piece of hardware generates encryption keys on a computer’s motherboard?
What piece of hardware generates encryption keys on a computer’s motherboard?
Signup and view all the answers
What type of rootkit sits undetected in the core components of the operating system?
What type of rootkit sits undetected in the core components of the operating system?
Signup and view all the answers
Which techniques are employed by Susan for real-time information updates?
Which techniques are employed by Susan for real-time information updates?
Signup and view all the answers
Which type of virus can change its own code and cipher itself multiple times?
Which type of virus can change its own code and cipher itself multiple times?
Signup and view all the answers
What behavior did Clark exhibit in the above scenario?
What behavior did Clark exhibit in the above scenario?
Signup and view all the answers
Which Nmap command must John use for the TCP SYN ping scan?
Which Nmap command must John use for the TCP SYN ping scan?
Signup and view all the answers
What symmetric key block cipher is characterized by a 128-bit block size?
What symmetric key block cipher is characterized by a 128-bit block size?
Signup and view all the answers
Which protocol does Bella use for secure data transfer?
Which protocol does Bella use for secure data transfer?
Signup and view all the answers
Study Notes
Penetration Testing and Cyber Security
- A penetration tester is authorized to perform a penetration test against a website using Google dorks to footprint the site, with the goal of obtaining results that show file extensions.
- The Google dork operator "filetype" would be used to achieve this.
Cyber Kill Chain
- A penetration tester is at the weaponization stage of the cyber kill chain, where they are creating a client-side backdoor to send to employees via email to test user awareness.
Google Advanced Operators
- The Google advanced operator "site" would be used to restrict a search to a specific organization's web domain.
Advanced Persistent Threat (APT)
- John, a professional hacker, performs an APT attack on a renowned organization, gaining unauthorized access to the target network without being detected for a long time and obtaining sensitive information.
Cloud Attacks
- Alice, a professional hacker, performs a Man-in-the-cloud (MITC) attack, infiltrating an MSP provider by sending spear-phishing emails and distributing custom-made malware to compromise user accounts and gain remote access to the cloud service.
Vulnerability Assessment
- Johnson, a security auditor, performs a wireless network assessment, identifying a rogue access point installed within an organization's perimeter, which is attempting to intrude into the internal network.
Encryption Algorithm
- Triple Data Encryption Standard (3DES) is an encryption algorithm where every individual block contains 64-bit data, and three keys are used, where each key consists of 56 bits.
Malware
- The network users are infected with Adware, which is causing their systems to slow down and display pop-ups with advertisements.
NetBIOS
- Allen, a professional pen tester, uses the NetBIOS API to enumerate NetBIOS and target the NetBIOS service, which is running on port 139.
Honeypot
- A honeypot is an appealing isolated environment for hackers to prevent them from compromising critical targets while simultaneously gathering information about the hacker.
Social Engineering
- Ralph, a professional hacker, uses impersonation to target Jane, posing as a legitimate customer support executive to gain physical access to her company and gather sensitive information.
Content Enumeration
- The fastest way to perform content enumeration on a given web server using the Gobuster tool is by performing content enumeration using a wordlist.
Wireless Attacks
- Bobby, an attacker, performs a rogue access point (evil twin) attack, hijacking and intercepting wireless communications by installing a fake communication tower between two authentic endpoints.
Firewall Evasion
- Idle scanning is a firewall evasion scanning technique that makes use of a zombie system that has low network activity as well as its fragment identification numbers.
Web Application Security
- John is investigating web-application firewall logs and observes someone attempting to inject malicious code, which is a buffer overflow attack.
DNS Cache Poisoning
- Steve, an attacker, performs DNS cache poisoning, exploiting vulnerabilities in the DNS server software and modifying the original IP address of the target website to redirect web traffic to a malicious website.
Containerization
- Abel, a cloud architect, uses container technology to deploy applications, verifying and validating image contents, signing images, and sending them to registries, which is part of the Tier-3: Registries of the container technology architecture.
Bluetooth Hacking
- Bluesnarfing is a Bluetooth hacking technique that refers to the theft of information from a wireless device through Bluetooth.
Wireless Network Security
- The old encryption protocol being used is WEP, which was designed to mimic wired encryption but is now considered insecure.
DNS Tunneling
- John, a professional hacker, uses DNS tunneling to perform data exfiltration on a target network, bypassing the firewall by embedding malicious data into the DNS protocol packets.
Digital Signatures
- Dorian is signing the message with his private key, and Poly will verify that the message came from Dorian by using Dorian's public key.
Nmap Scanning
- Nmap is used to scan a network and identify open ports and running services, with the option -sV used to determine the type and version number of the web server.
Security Processes
- A failure in patch management is likely the cause of the Equifax data breach, as a fix was available from the software vendor for several months prior to the intrusion.
Web Server Security
- Common files on a web server that can be misconfigured and provide useful information for a hacker include php.ini, httpd.conf, and administration.config.
Compliance and Regulations
- The SOX law was designed to improve the accuracy and accountability of corporate disclosures, covering accounting firms and third-party providers that offer financial services to some organizations.
Vulnerability Assessment
- James, a pen tester, employs a service-based solution, scanning the organization to build an inventory of protocols found on the machines and detecting which ports are attached to services such as an email server, web server, or database server.
Cloud Computing Security
- The telecom company providing Internet connectivity and transport services between the organization and the cloud service provider falls under the category of Cloud carrier in the NIST cloud deployment reference architecture.
Web Server Security
- Larry must implement countermeasures to secure the user accounts on the web server, including limiting administrator or root-level access to the minimum number of users.
iOS Security
- Clark, an attacker, performs an iOS trustjacking attack, gaining access to Steven's iPhone through an infected public computer and monitoring and reading all of Steven's activity on the iPhone even after it is out of the communication zone.
Session Fixation Attack
- Boney, a professional hacker, performs a session fixation attack, sending his session ID using an MITM attack technique and linking the target employee's account page without disclosing any information to the victim.
Botnet Creation
- The attacker uses the hit-list scanning technique to create a botnet, collecting information about a large number of vulnerable machines, infecting the machines, and dividing the list by assigning half of the list to newly compromised machines.
Cryptographic Attacks
- The KRACK attack is a cryptographic attack where an adversary tricks a victim into reinstalling an already-in-use key, resetting associated parameters such as the incremental transmit packet number and receive packet number to their initial values.
OT Network Security
- Jim, a professional hacker, uses an Nmap command to identify Ethernet/IP devices connected to the Internet and gather information such as the vendor name, product code and name, device name, and IP address.### Types of Attacks
- DNS hijacking: redirecting website traffic to a false website by modifying DNS resolution
- DHCP spoofing: maliciously configuring a DHCP server to redirect traffic
- ARP cache poisoning: sending false ARP messages to associate an attacker's MAC address with a target IP
- DoS attack: overwhelming a system with traffic to make it unavailable
- Agent Smith attack: replacing legitimate apps with fake ones on a mobile device
- Clickjacking: tricking users into clicking on something they didn't intend to
- SIM card attack: exploiting vulnerabilities in SIM card software
- Phishing: tricking users into revealing sensitive information
Vulnerability Assessment
- OS detection: using tools like Unicornscan to identify the operating system of a target system
- TTL value: a value that indicates the operating system of a target system (e.g. Windows = 128)
- False positives: false alarms in vulnerability scanning
- False negatives: missed vulnerabilities in scanning
- True positives: correctly identified vulnerabilities
- True negatives: correctly identified non-vulnerable systems
Web Application Security
- SQL injection: injecting malicious code into a database to extract or modify data
- Banner grabbing: obtaining information about a web server, such as OS and service versions
- Union-based SQL injection: using UNION operators to extract data from multiple tables
- Time-based SQL injection: using time delays to extract data
- Cross-site request forgery (CSRF): tricking users into performing unintended actions
- Website mirroring: creating a copy of a website to analyze its structure and content
Cryptography
- PGP (Pretty Good Privacy): a method for encrypting email communications
- CVSS (Common Vulnerability Scoring System): a method for scoring the severity of vulnerabilities
- WPA3: a encryption protocol for wireless networks
- LDAP (Lightweight Directory Access Protocol): a protocol for accessing directory services
Network Security
- TCP Maimon scan: a type of port scan that sends a packet with the flag set to SYN, SYN-ACK, FIN, and ACK
- ACK flag probe scan: a type of port scan that sends packets with the ACK flag set
- UDP scan: a type of port scan that sends UDP packets
- IDLE/IPID header scan: a type of port scan that sends packets with the IDLE/IPID headers set
Cloud Security
- IaaS (Infrastructure as a Service): a cloud computing model that provides virtualized infrastructure
- PaaS (Platform as a Service): a cloud computing model that provides a platform for developing applications
- SaaS (Software as a Service): a cloud computing model that provides software applications over the internet### Web Service API
- The type of web service API mentioned is a REST API, which uses HTTP methods such as PUT, POST, GET, and DELETE to improve the overall performance, visibility, scalability, reliability, and portability of an application.
SQL Injection Attack
- SQL injection attacks attempt to inject SQL syntax into web requests, which may bypass authentication and allow attackers to access and/or modify data attached to a web application.
- Out-of-band SQLi is a type of SQLi that leverages a database server's ability to make DNS requests to pass data to an attacker.
Jailbreaking Technique
- Untethered jailbreaking is a technique that patches the kernel during the device boot, making the device jailbroken after each successive reboot.
Docker Architecture
- Docker daemon is a component of the Docker architecture used to process API requests and handle various Docker objects, such as containers, volumes, images, and networks.
Social Engineering
- Social engineering is a technique used to compromise AWS IAM credentials by luring an employee into revealing sensitive information, such as through fake calls or phishing emails.
DHCP Attack
- DHCP starvation is an attack where an attacker broadcasts forged DHCP requests and leases all the DHCP addresses available in the DHCP scope, leading to a DoS attack.
Wireless Network Attack
- Piggybacking is a wireless network attack where an attacker gains unauthorized access to a wireless network by using another user's authentication.
Vulnerability Management
- Remediation is the phase of the vulnerability management life cycle where fixes are applied to vulnerable systems to reduce the impact and severity of vulnerabilities.
Website Attack
- HTML injection is an attack where an attacker injects malicious code into a website, which can lead to the theft of session cookies and session IDs.
Footprinting Technique
- Whois footprinting is a technique used to gather domain information, such as the target domain name, contact details of its owner, expiry date, and creation date.
SMTP Command
- VRFY is an SMTP command used to check for valid users on an SMTP server.
Social Engineering Attack
- Phishing is a social engineering attack where an attacker steals sensitive information, such as login credentials, by asking users to respond to questions or provide information through fake websites or emails.
Tool for Information Gathering
- Infoga is a tool used to track emails and extract information such as sender identities, mail servers, sender IP addresses, and sender locations from different public sources.
Type of Hacker
- White-hat hacker is a security professional who discovers vulnerabilities and reports them to the owner of the vulnerable system, with the intention of helping to improve the system's security.
Linux Pipe
- curl -s https://site.com | grep "< a href="http" | grep "site.com" | cut -d """ -f 2 is a Linux pipe used to grab all the links from a website's main page.
Evasion Technique
- NULL byte is an evasion technique used to evade signature-based IDS/IPS by inserting a NULL byte (%00) at the end of the payload.
Attack
- Server-side request forgery (SSRF) attack is a type of attack where an attacker targets a web server with the intention of accessing backend servers protected by a firewall.
Vulnerability Disclosure Program
- Bug bounty program is a vulnerability disclosure program where companies offer rewards to security researchers who discover and report vulnerabilities in their systems.
Tool Employed
- VisualRoute is a tool used to perform a location search to detect geolocation and gather information to perform sophisticated attacks.
Wireless Security Protocol
- WPA3-Enterprise is a wireless security protocol that allows for 192-bit minimum-strength security protocols and cryptographic tools to protect sensitive data.
Attack Performed
- STP attack is an attack where an attacker targets an organization's network to sniff all the traffic by plugging in a rogue switch to an unused port in the LAN.
Protocol and Security
- SNMP is a protocol used for managing and monitoring network devices, and it should be changed to SNMP V3, which is encrypted, to secure the traffic.
Short-Range Wireless Communication Technology
- Zigbee is a short-range wireless communication technology used in devices that transfer data infrequently at a low rate in a restricted area, within a range of 10–100 m.
Regulation Violation
- HIPAA/PHI is a regulation that protects personal medical records, and a violation of this regulation can result in exposed patient data.
Type of Vulnerability Assessment
- Host-based assessment is a type of vulnerability assessment performed by Martin to identify vulnerabilities such as native configuration tables, incorrect registry or file permissions, and software configuration errors.
Attack Possible
- Directory traversal is an attack possible when a web server does not properly ignore the “dot dot slash” (../) character string and instead returns the file listing of a folder higher up in the folder structure of the server.
Type of Attack
- TCP/IP hijacking is a type of attack where an attacker intercepts and sends spoofed packets to a host machine, allowing the attacker to communicate with the host machine on behalf of the original user.
Rootkit Type
- Kernel rootkit is a type of rootkit that sits undetected in the core components of the operating system, allowing an attacker to maintain access to a machine.
Encryption Algorithm
- Twofish encryption algorithm is a symmetric key block cipher with a 128-bit block size, and its key size can be up to 256 bits.
Protocol Used
- HTTPS is a protocol used to send data using encryption and digital certificates, ensuring secure data transmission.
Industrial Control Systems Security
- Connecting industrial control systems to the Internet can lead to security breaches, making it essential to implement secure protocols and encryption mechanisms to protect sensitive data.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge of penetration testing and cyber security concepts, including Google dorks and client-side backdoors. Identify the correct Google dork operator and stage of a cyber attack.