James, a research scholar, received an email informing that someone is trying to access his Google account from an unknown device. When he opened his email
message, it looked like a standard Google notification instructing him to click the link below to take further steps. This link was redirected to a malicious webpage
where he was tricked to provide Google account credentials. James observed that the URL began with www.translate.google.com giving a legitimate appearance.
In the above scenario, identify the type of attack being performed on James' email account?
Arrange the WEP cracking process in the correct order:
I. aireplay-ng -1 0 -e SECRET_SSID -a 1e:64:51:3b:ff:3e -h a7:71:fe:8e:d8:25 eth1
II. aircrack-ng -s capture.ivs
III. airmon-ng start eth1
IV. airodump-ng --ivs --write capture eth1
V. aireplay-ng -3 -b 1e:64:51:3b:ff:3e -h a7:71:fe:8e:d8:25 eth1
Recently, Jacob was assigned a project to test the perimeter security of one of a client. As part of the project, Jacob wants to test whether or not a particular port on
the firewall is open or closed. He used the hping utility with the following syntax:
#hping
During scanning of a test network, Paul sends TCP probe packets with the ACK flag set to a remote device and then analyzes the header information (TTL and
WINDOW field) of the received RST packets to find whether the port is open or closed.
Analyze the scanning result below and identify the open port.
Rebecca works as a Penetration Tester in a security service firm named Xsecurity. Rebecca placed a sniffer on a subnet residing deep inside the client's network.
She used the Firewalk tool to test the security of the company's network firewall. After the test, when Rebecca checked the sniffer logs, she was unable to see any
traffic produced by the Firewalk tool.
What is the reason for this?
An organization hosted a website to provide services to its customers. A visitor of this website has reported a complaint to the organization that they are getting an
error message with code 502 when they are trying to access the website. This issue was forwarded to the IT department in the organization. The IT department
identified the reason behind the error and started resolving the issue by checking whether the server is overloaded, whether the name resolution is working
properly, whether the firewall is configured properly, etc.
Identify the error message corresponding to code 502 that the visitors obtained when they tried to access the organization's website?
Adam found a pen drive in his company's parking lot. He connected it to his system to check the content. On the next day, he found that someone has logged into
his company email account and sent some emails. What type of social engineering attack has Adam encountered?
A month ago, Jason, a software developer at a reputed IT firm was surfing through his company's website. He was visiting random pages of the company's website
and came to find confidential information about the company was posted on one of the web pages. Jason forgot to report the issue. Jason contacted John, another
member of the Security Team, and discussed the issue. John visited the page but found nothing wrong.
What should John do to see past versions and pages of a website that Jason saw one month back?
HDC Networks Ltd. is a leading security services company. Matthew works as a penetrating tester with this firm. He was asked to gather information about the
target company. Matthew begins with social engineering by following the steps:
I. Secretly observes the target to gain critical information
II. Looks at employee's password or PIN code with the help of binoculars or a low-power telescope
Based on the above description, identify the information gathering technique.