Ethical Hacking 12a Flashcards

1
Q

At what layer do routers allow the datagram to hop from the source to the destination, one hop at a time?

A

network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does an attacker have to predict or guess in a blind hijacking attack?

A

the sequence number that a host sends

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A client has asked you to evaluate their web application. Upon using the application, you notice that user session data appears in the URL. What is the web application doing?

A

The web application is using GET requests to pass session data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which term refers to the exploitation of a valid computer communication during which an attacker takes over the conversation between two computers?

A

Session Hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Your client has come to you requesting that you assit the implementation of session hijacking countermeasures. What approaches are valid for this request?

A

Minimize remote access, and require strong authentication and encryption use for all VPNs.

Allow limited incoming connections and only from known trusted IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When conducting a TCP/IP hijacking, what type of attack has the attacker adding an authentic-looking reset packet?

A

RST Hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

At what point during a TCP communication session does the client enter the established state?

A

It is established after the client acknowledges the server sequence number by incrementing it and setting the ACK flag.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In application-level hijacking, the session IDs can be obtained using a man-in-the-middle situation, which is referred to as what technique?

A

Sniffing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is a process that allows the sender to specify a specific route for an IP packet to take to the destination?

A

Source routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

After monitoring and sniffing a client’s network activity, you discover that communication between one server and another host appears to be source routed. How can you take advantage of this fact?

A

You can spoof the trusted host’s IP address and then utilize the source routing to trick the server into believing your workstation is the trusted host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What statement accurately describes how blind hijacking works with TCP?

A

In blind hijacking, an attacker must succeed in predicting or guessing the TCP sequence numbers of packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which type of hijacking is a hacking technique that uses spoofed packets to take over a connection between a victim and a target machine?

A

TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

During which stage of a session hijacking does the attacker change the sequence number or the acknowledgment number of the server?

A

Desynchronizing the connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In what type of exploitation does an attacker steal a valid session ID and use it to get into the system to extract data?

A

Session hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which layer communicates with the physical hardware and is responsible for the delivery of signals from the source to the destination over a physical communication platform?

A

data link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In an application level session hijack, what are some valid techniques to uncover session IDs?

A

Examine the contents of cookies stored on the client’s machine.

HTML injection and cross site scripting can be used to steal application session information.

17
Q

Which statements accurately describe active and passive attacks? (Choose all that apply.)

A

A passive attack monitors an ongoing session.

An active attack takes over an existing session.

18
Q

What of the following is NOT an example of a network-level hijacking attack?

A

DNS spoofing

19
Q

As part of an audit of a network, a client has asked you to test their network against man in the middle and application attacks. You have decided to use a tool that can also perform spidering and proxy chaining. What application should you use?

A

Paros HTTP Session Hijacking Tool

20
Q

What two different flags can be set in order to close a TCP connection?

A

FIN

RST