A large company intends to use Blackberry for corporate mobile phones and a security analyst is assigned to
evaluate the possible threats. The analyst will use the Blackjacking attack method to demonstrate how an
attacker could circumvent perimeter defenses and gain access to the corporate network.
What tool should the analyst use to perform a Blackjacking attack?
A pentester gains acess to a Windows application server and needs to determine the settings of the built-in
Windows firewall.
Which command would be used?
The following is a sample of output from a penetration tester's machine targeting a machine with the IP address
of 192.168.1.106:
What is most likely taking place?
While checking the settings on the internet browser, a technician finds that the proxy server settings have been
checked and a computer is trying to use itself as a proxy server.
What specific octet within the subnet does the technician see?