Ethical Hacking 9 Flashcards
What is the ARP method of detecting a sniffer on the LAN?
ARP packets are transmitted with a nonbroadcast IP address, and any responding systems are suspected to be running a network sniffer.
Which ARP poisoning tools can be used to sniff and analyze traffic generated by SSH? (Choose all that apply.)
Ettercap
Cain and Abel
Your consulting company has been hired to secure a client’s network. Specifically, the client has asked that you determine hosts on the network that are using protocols vulnerable to sniffing that might compromise user account information. What protocols should you look for when sniffing the network?
telnet, SNMP, FTP
You are currently connected to a switch and are attempting to capture all network traffic on the LAN. How can you force all traffic on this switched Ethernet network to become visible to your sniffing application?
Use ARP spoofing software and spoof the MAC address of the local gateway.
Overwhelm the network switch utilizing MAC address flooding, forcing it to broadcast all frames out all ports.
Which method for sniffing the network causes traffic to pass through the wrong gateway because computers have the wrong MAC address for the gateway.
ARP spoofing
Which of the DNS poisoning techniques involves an attacker using a Trojan to change the victim’s DNS server IP address to that of the attacker’s machine?
Internet DNS spoofing
While capturing network traffic as part of a network audit, you discover an active telnet session that appears to be automated. What tool can you utilize to inject commands into this communication, possibly allowing you to gain access to a system?
Ettercap
When using Snort to capture packets, which switch is used to specify which class of network packets has to be captured by IP address?
-h
Whichattack works by broadcasting DHCP requests with spoofed MAC addresses?
DHCP starvation
What WinDump command should you use to display output using IP addresses and actual TCP/IP sequence numbers?
windump -n -S
In the 1992 movie “Sneakers”, a group of hackers collect trash from a target individual’s home for the purpose of gathering intelligence on the corporation the individual works for. What is this an example of?
dumpster diving
Which method used to detect sniffing can identify a system operating in promiscuous mode by using a nonbroadcast IP address request?
ARP Method
What protocols are most vulnerable to sniffing? (Choose three.)
SNMP, Telnet, HTTP
A client has asked you to deploy software that will allow them to collect information about network packets, analyze the packets, and then generate reports regarding network traffic. They would like this information to be available via a web interface. What tool can you deploy?
ntop
What statements regarding the different types of sniffing is accurate?
Most sniffing tools are suited primarily to sniff data in a hub environment, utilizing passive sniffing.
Active sniffing involves the injection of traffic designed to enable total traffic collection on a switched LAN.