Podcast
Questions and Answers
How can we filter for port 443?
How can we filter for port 443?
tcp.port == 443
How can we be more accurate when filtering for port 443?
How can we be more accurate when filtering for port 443?
(tcp.srcport == 443 && ip.src == 64.13.134.52) || (tcp.dstport == 443 && ip.dst == 64.13.134.52)
What if we wanted to check all the responses from the target?
What if we wanted to check all the responses from the target?
ip.src == 64.13.134.52
How can we filter for open ports only?
How can we filter for open ports only?
Signup and view all the answers
What is a gratuitous ARP?
What is a gratuitous ARP?
Signup and view all the answers
How can an attacker use gratuitous ARPs?
How can an attacker use gratuitous ARPs?
Signup and view all the answers
What is the purpose of using gratuitous ARPs?
What is the purpose of using gratuitous ARPs?
Signup and view all the answers
Why is it important to know the MAC address of the target?
Why is it important to know the MAC address of the target?
Signup and view all the answers
What type of attack involves using gratuitous ARPs?
What type of attack involves using gratuitous ARPs?
Signup and view all the answers
What happens when an attacker successfully uses gratuitous ARPs?
What happens when an attacker successfully uses gratuitous ARPs?
Signup and view all the answers
What is the first step of attacking a network?
What is the first step of attacking a network?
Signup and view all the answers
What type of scan sends a SYN request to hosts and port numbers to scan for potential services?
What type of scan sends a SYN request to hosts and port numbers to scan for potential services?
Signup and view all the answers
How does SYN Scan determine which ports are open on a target host?
How does SYN Scan determine which ports are open on a target host?
Signup and view all the answers
What does a target host's response of SYN/ACK indicate during a SYN Scan?
What does a target host's response of SYN/ACK indicate during a SYN Scan?
Signup and view all the answers
In SYN Scan, what does a target host's response of RST indicate?
In SYN Scan, what does a target host's response of RST indicate?
Signup and view all the answers
How can Wireshark help in identifying which ports are open, closed, and filtered during a SYN Scan?
How can Wireshark help in identifying which ports are open, closed, and filtered during a SYN Scan?
Signup and view all the answers
How does session hijacking work?
How does session hijacking work?
Signup and view all the answers
What was the purpose of FireSheep addon?
What was the purpose of FireSheep addon?
Signup and view all the answers
How has the mass adoption of HTTPS impacted session hijacking?
How has the mass adoption of HTTPS impacted session hijacking?
Signup and view all the answers
What method can be used in a man-in-the-middle attack to intercept traffic and pretend to be the destination?
What method can be used in a man-in-the-middle attack to intercept traffic and pretend to be the destination?
Signup and view all the answers
What is typically encrypted when using HTTPS?
What is typically encrypted when using HTTPS?
Signup and view all the answers
What can be observed in Wireshark when the session is transmitted over plain HTTP?
What can be observed in Wireshark when the session is transmitted over plain HTTP?
Signup and view all the answers
What is the purpose of ransomware?
What is the purpose of ransomware?
Signup and view all the answers
What is the significance of the C2 sequence in the context of cyber attacks?
What is the significance of the C2 sequence in the context of cyber attacks?
Signup and view all the answers
How is encryption typically performed in cyber attacks?
How is encryption typically performed in cyber attacks?
Signup and view all the answers
What is the role of browser extensions in changing session cookies?
What is the role of browser extensions in changing session cookies?
Signup and view all the answers
What type of file was involved in the attack scenario described?
What type of file was involved in the attack scenario described?
Signup and view all the answers
What is the action taken by the user that leads to the suspicious POST requests?
What is the action taken by the user that leads to the suspicious POST requests?
Signup and view all the answers