Jimmy, an attacker, knows that he can take advantage of poorly designed input validation routines to create
or alter SQL commands to gain access to private data or execute commands in the database. What
technique does Jimmy use to compromise a database?
This IDS defeating technique works by splitting a datagram (or packet) into multiple fragments and the IDS
will not spot the true nature of the fully assembled datagram. The datagram is not reassembled until it
reaches its final destination. It would be a processor-intensive task for IDS to reassemble all fragments
itself, and on a busy system the packet will slip through the IDS onto the network. What is this technique
called?
If a competitor wants to cause damage to your organization, steal critical secrets, or put you out of
business, they just have to find a job opening, prepare someone to pass the interview, have that person
hired, and they will be in the organization.
How would you prevent such type of attacks?
This type of Port Scanning technique splits TCP header into several packets so that the packet filters are
not able to detect what the packets intends to do.
Joel and her team have been going through tons of garbage, recycled paper, and other rubbish in order to
find some information about the target they are attempting to penetrate. How would you call this type of
activity?
Anonymizer sites access the Internet on your behalf, protecting your personal information from disclosure.
An anonymizer protects all of your computer's identifying information while it surfs for you, enabling you to
remain at least one step removed from the sites you visit.
You can visit Web sites without allowing anyone to gather information on sites visited by you. Services that
provide anonymity disable pop-up windows and cookies, and conceal visitor's IP address.
These services typically use a proxy server to process each HTTP request. When the user requests a Web
page by clicking a hyperlink or typing a URL into their browser, the service retrieves and displays the
information using its own server. The remote server (where the requested Web page resides) receives
information on the anonymous Web surfing service in place of your information.
In which situations would you want to use anonymizer? (Select 3 answers)
TCP SYN Flood attack uses the three-way handshake mechanism.
1. An attacker at system A sends a SYN packet to victim at system B.
2. System B sends a SYN/ACK packet to victim A.
3. As a normal three-way handshake mechanism system A should send an ACK packet to system B,
however, system A does not send an ACK packet to system B. In this case client B is waiting for an ACK
packet from client A.
This status of client B is called _________________
You run nmap port Scan on 10.0.0.5 and attempt to gain banner/server information from services running
on ports 21, 110 and 123.
Here is the output of your scan results:
Which of the following nmap command did you run?