EH QB ANS
EH QB ANS
Q1) What is hacking also explain what are hacker classes in short.
Hacker Classes
4. Script Kiddies
5. Hacktivists
Black Box Testing: The hacker has no prior knowledge of the system and
tests the software from an external perspective using brute force.
White Box Testing: The hacker has prior knowledge of the system.
Gray Box Testing: Combines elements of both white box and black box
testing to provide a more comprehensive security assessment.
Hacking technology refers to the methods and tools used to gain unauthorized
access to computer systems, networks, or devices. It encompasses various
techniques that hackers employ to exploit vulnerabilities for different purposes,
ranging from malicious intent to ethical hacking.
1. Reconnaissance / Footprinting
This is the initial phase where ethical hackers gather as much information as
possible about the target system. The purpose is to understand the environment
and identify potential vulnerabilities.
Types of Reconnaissance:
The information gathered during this phase is crucial for planning subsequent
steps in the hacking process.
2. Scanning
In this phase, ethical hackers use various tools to interact with the target system
and identify vulnerabilities.
Key Activities:
Port Scanning: Identifying open ports and the services running on them.
This phase helps in creating a detailed map of the target's security posture,
which is essential for planning attacks.
3. Gaining Access
Objectives:
To simulate what a real attacker could achieve by exploiting these
vulnerabilities.
Understanding how deep they can penetrate into the system and what
kind of damage could be inflicted.
This phase provides insights into the effectiveness of existing security measures
and highlights areas needing improvement.
4. Maintaining Access
After gaining access, ethical hackers aim to maintain their presence within the
system for a period, simulating advanced persistent threats (APTs).
Techniques Used:
The goal is to understand how attackers can remain undetected over time,
allowing organizations to strengthen their defenses against such threats.
5. Covering Tracks
In this final phase, ethical hackers clean up after their testing to ensure that no
evidence of their activities remains on the system.
Activities Include:
This phase is crucial for ensuring that ethical hacking does not disrupt normal
operations or leave systems vulnerable post-assessment. It also helps
cybersecurity professionals understand how malicious hackers might attempt to
erase their footprints.
5) Define Hacktivism and explain ways to manifest it. (2024)
1. Website Defacement:
Hacktivists may gain unauthorized access to a website and alter its content,
displaying messages that promote their cause. This act serves to embarrass
the targeted organization and raise public awareness about the issue at hand.
Utilizing social media platforms, hacktivists can spread awareness about their
causes and mobilize support for their actions. They often use hashtags and
viral content to reach larger audiences.
6. Cyber Protests:
Creating campaigns that educate the public about specific issues through
digital means, including videos, infographics, and interactive websites that
engage users in activism.
9. Collaborative Actions:
Black hat hackers are individuals who exploit vulnerabilities in computer systems
and networks for malicious purposes. They operate outside the law, focusing on
personal gain, financial profit, or causing harm. Their methods include deploying
malware, conducting phishing attacks, and executing denial-of-service (DoS)
attacks. Black hat hackers often work alone or as part of organized crime groups,
utilizing the dark web to sell stolen data and hacking tools. Their actions can lead
to severe consequences, including data breaches, financial losses for businesses,
and reputational damage for individuals.
White hat hackers, also known as ethical hackers, use their skills to improve
security systems rather than exploit them. They are often employed by
organizations to conduct penetration testing and vulnerability assessments,
helping to identify and fix security weaknesses before malicious hackers can
exploit them. White hat hackers operate within legal boundaries and adhere to
ethical guidelines, making their work crucial for enhancing cybersecurity. They
may also provide training and awareness programs to educate employees about
security best practices.
Red hat hackers are vigilante hackers who take aggressive action against black
hat hackers. Unlike white hats who work within legal frameworks, red hats may
employ illegal methods to disrupt or destroy the operations of malicious hackers.
They actively seek out black hat activities and retaliate by infiltrating their
networks or disabling their systems. Red hat hackers often operate independently
or in small groups, motivated by a desire to protect others from cyber threats.
Blue hat hackers can refer to two different types of individuals: those who seek
revenge against a target and those who help organizations identify vulnerabilities
before software deployment. The former may engage in hacking activities as a
form of retaliation, while the latter are often invited by companies to test their
systems for security flaws prior to launching new software or applications. Blue
hats play an essential role in identifying weaknesses that could be exploited by
malicious actors.
1. Testing Methodologies:
Static Analysis: This involves examining the code without executing it.
Tools are used to analyze the code for common vulnerabilities and
coding errors.
2. Vulnerability Identification:
5. Remediation Recommendations:
1. Reconnaissance
This is the initial phase where ethical hackers gather information about the
target system or network. It involves two types of reconnaissance:
2. Scanning
In this phase, ethical hackers use various tools to identify vulnerabilities in the
target system. This includes:
Port Scanning: Identifying open ports and services running on those ports.
4. Maintaining Access
After gaining access, ethical hackers may try to maintain their foothold in the
system. This can involve:
Creating Backdoors: Installing software that allows for re-entry into the
system without detection.
5. Clearing Tracks
Ethical hackers ensure they do not leave any traces of their activities, which
involves:
Covering Footprints: Ensuring that any changes made during testing do not
alert the system administrators.
6. Reporting
The final phase involves documenting findings and providing a detailed report to
the organization. This report typically includes:
Types of Footprinting
1. Active Footprinting
Active footprinting involves directly interacting with the target system to gather
information. This method can include:
Network Scanning: Using tools like Nmap to identify open ports and
services running on the target.
Ping Sweeps: Sending ICMP packets to determine which hosts are active
on a network.
Traceroute: Mapping the path data takes to reach the target, revealing
information about network infrastructure.
Active footprinting can trigger security alerts and may be logged by intrusion
detection systems (IDS), so it requires careful execution to avoid detection.
2. Passive Footprinting
1. Footprinting
DNS Interrogation: Using tools to query the Domain Name System (DNS)
for details about the target's domain and associated records.
2. Scanning
Scanning is a method used to identify active systems, open ports, and services
running on those ports within a network. Techniques include:
3. Active Reconnaissance
Network Scanning: Actively probing the network to identify live hosts and
services.
4. Passive Reconnaissance
OSINT refers to collecting information from publicly available sources. This can
include:
Search Engines: Using Google or other search engines to find relevant data
about the target.
6. War Dialing
7. Dumpster Diving
1. Purpose:
2. Methods:
Zone Transfers: This method involves requesting a zone transfer from a DNS
server, which can reveal all DNS records for a domain if the server is
misconfigured to allow it.
DNS Queries: Using tools like nslookup or dig, ethical hackers can query
specific DNS record types to gather detailed information about the target.
Brute-Force Subdomain Discovery: This technique involves systematically
guessing subdomains to uncover hidden assets that may not be publicly listed.
3. Significance in Cybersecurity:
4. Tools Used:
5. Countermeasures:
WHOIS and ARIN lookups are essential tools in cybersecurity and network
management, providing valuable information about domain ownership and IP
address allocation.
WHOIS Lookup
Key Features:
Uses in Cybersecurity:
ARIN Lookup
Definition: ARIN (American Registry for Internet Numbers) is one of the five
Regional Internet Registries (RIRs) responsible for managing IP address
allocation in North America. An ARIN lookup allows users to retrieve information
about IP address assignments and related entities.
Key Features:
Routing Information: The lookup may also reveal details about the routing
status of an IP address within the internet infrastructure.
Uses in Cybersecurity:
DNS records are essential components of the Domain Name System (DNS) that
provide vital information about domain names and their associated resources. In
ethical hacking, understanding the different types of DNS records is crucial for
reconnaissance and vulnerability assessment. Here are the main types of DNS
records:
Usage: It is the most common DNS record type, allowing users to access
websites using human-readable domain names instead of numerical IP
addresses.
Usage: Essential for directing queries about a domain to the correct DNS
server, ensuring that users can resolve the domain name to its
corresponding IP address.
Usage: Commonly used for email validation and security purposes, such as
SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail),
helping to prevent email spoofing.
Usage: Used in zone transfers and helps manage DNS zone settings.
Usage: Useful for directing traffic for specific services like VoIP or
instant messaging.
2. TTL Decrement: Each router that receives the packet decrements the
TTL value by one. When the TTL reaches zero, the router discards the
packet and sends back an ICMP "Time Exceeded" message to the source.
The round-trip time for three attempts to reach each hop, allowing
for analysis of latency and performance.
Importance in Footprinting
Email tracking is a method used to monitor how recipients interact with emails
after they have been sent. It provides valuable insights into email performance
and recipient behavior, such as whether an email was opened, how long it was
viewed, and which links were clicked.
1. Tracking Pixels:
A tracking pixel is a small, often invisible image embedded within the email.
When the recipient opens the email, their email client loads this image from
the sender's server. This action sends a signal back to the server, indicating
that the email has been opened.The tracking pixel can also provide information
about the recipient's device and location based on the IP address.
2. Trackable Links:
Trackable links are URLs embedded in the email that contain unique identifiers
or tracking codes. When a recipient clicks on one of these links, the tracking
tool captures data about the click, including who clicked it and when.
3. Read Receipts:
c) Watering hole attack d) Brute force attack e) Phishing and fake WAP
a) Keystroke Logging
Keystroke logging (or keylogging) is the practice of recording every key pressed
on a keyboard, typically without the user's knowledge. Attackers use keyloggers
to capture sensitive information like usernames, passwords, credit card details,
and personal messages. Keylogging software can be installed through malware,
phishing, or direct physical access to a device. The captured data is stored and
then retrieved by the attacker.
Fake WAP (Wireless Access Point): A fake WAP is a rogue Wi-Fi hotspot
set up by an attacker to intercept network traffic. Users who connect to
the fake WAP unknowingly expose their data to the attacker, who can steal
login credentials, credit card numbers, and other sensitive information.
These fake access points often mimic legitimate Wi-Fi networks.
a) Eavesdropping Attack
MitM attacks can happen in various scenarios, such as unsecured Wi-Fi networks
where attackers can capture data packets being sent between devices. Attackers
may use techniques like session hijacking or SSL stripping to exploit
vulnerabilities in secure connections, allowing them to gain access to sensitive
information like passwords or financial details.
c) Session Hijacking
Once the attacker has access to these credentials, they can impersonate the user
and perform actions on their behalf without needing to log in again. This can lead
to unauthorized access to sensitive information, account manipulation, or even
financial theft. Session hijacking can occur through various methods, including
network eavesdropping, cross-site scripting (XSS), or malware.
d) Clickjacking
For example, a user might think they are clicking a button to play a video but
instead are clicking a hidden button that authorizes a financial transaction or
changes their account settings. Clickjacking exploits user trust and can lead to
serious security breaches if not properly mitigated.
e) Cookie Theft
Cookie theft involves stealing session cookies from a user's browser in order to
impersonate them on web applications. Cookies are small pieces of data stored by
web browsers that contain authentication tokens used to maintain user sessions.
Attackers can use various methods to steal cookies, including cross-site scripting
(XSS), where malicious scripts extract cookie data from a user's browser. Once
stolen, these cookies can be used by attackers to gain unauthorized access to
user accounts and perform actions as if they were the legitimate user. Protecting
against cookie theft often involves implementing proper security measures such
as secure cookie attributes (e.g., HttpOnly and Secure flags) and using encryption
for sensitive data transmission.
19) What is scanning/Explain Port Scanning in detail and its types? (2019,
2023, 2024)
Closed: The destination receives the packet but does not have a service
listening on that port.
Attackers use port scanning to identify weak points for exploitation. It is often
the first step in targeting networks, providing valuable details about the
environment. Port scanning can be used to:
Prepare for specific attacks like Denial of Service (DoS) or data breaches.
1. TCP Connect Scan: Establishes a full TCP connection with the target port.
If successful, the port is considered open; if it fails, it is closed.
5. NULL Scan: Sends packets with no flags set. The response (or lack
thereof) can indicate whether a port is open or closed.
6. Xmas Tree Scan: Sends packets with the FIN, URG, and PSH flags set.
Similar to FIN scans but can be more effective against certain systems.
20) Define port Scanning with example.
When a port scan is initiated, a port scanner sends requests to various ports on
the target system. The responses received help classify the ports into three
categories:
3. Filtered: The port does not respond to the scan, often due to a firewall or
security device blocking the request.
For example, consider a network administrator who wants to assess the security
of their web server. They might use a tool like Nmap (Network Mapper) to
perform a port scan. The administrator could run a command such as:
text
In this command:
The output from this scan might show that ports 80 (HTTP), 443 (HTTPS), and
22 (SSH) are open, while others are closed or filtered. This information allows
the administrator to identify services running on those ports and determine if
any security measures need to be implemented.
Types of Port Scanning
There are several types of port scans, each with different techniques and
purposes:
1. TCP Connect Scan: Establishes a full TCP connection with the target port.
If successful, it indicates that the port is open.
3. UDP Scan: Sends UDP packets to target ports. Since UDP does not
establish a connection like TCP, responses can vary based on whether the
port is open, closed, or filtered.
5. NULL Scan: Sends packets with no flags set; responses help infer whether
ports are open or closed.
6. Xmas Tree Scan: Sends packets with FIN, URG, and PSH flags set; similar
to FIN scans but can yield different results based on how systems respond.
21) Write a brief note on Network Scanning
1. Host Discovery: This initial step determines which devices (hosts) on the
network are online. It often involves sending ping requests to various IP
addresses and waiting for responses to identify active hosts.
2. Port Scanning: Once active hosts are identified, the next step is to check
which ports are open on those hosts. This is done by sending packets to
specific ports and analyzing the responses to determine their status.
3. Service Detection: After identifying open ports, the scanning process can
determine what services are running on those ports. Each port is usually
associated with a specific service (e.g., HTTP on port 80).
4. Operating System Detection: The final step often involves identifying the
operating system of the host by analyzing the responses received during
the scanning process.
Port Scanning: This method checks specific ports on a host to see which
ones are open or closed, revealing potential entry points for attackers.
UDP Scan: Sends User Datagram Protocol (UDP) packets to target ports.
The response helps determine whether the ports are open or closed based
on the returned messages.
Importance of Network Scanning
1. Check for Live Systems: The first step involves identifying which systems
are active on the network. This is often done using a ping sweep, where ICMP
echo requests are sent to a range of IP addresses to determine which hosts
respond. Systems that reply are considered "live" and available for further
scanning.
2. Port Scanning: Once live systems are identified, the next step is to scan for
open ports on these systems. Port scanning involves probing each port on a
host to determine which ones are open and what services are running on them.
This information is critical for understanding potential entry points for
attacks.
XMAS Scan: Sends packets with multiple TCP flags set (FIN, URG, PSH).
If a port is open, there is no response; if closed, a reset packet is returned.
FIN Scan: Similar to XMAS but only sends packets with the FIN flag set.
It can help identify closed ports based on responses received.
NULL Scan: Sends packets with no flags set; responses help infer whether
ports are open or closed.
24) What are the ping Sweep Techniques and define its approaches
Tools like Nmap can be used to perform a basic ping sweep. For example, the
command nmap -sn 192.168.1.0/24 sends ping requests to all addresses in the
specified subnet.
2. Flood Pinging:
3. Using Scripting:
Scripting languages can automate the ping sweep process. For example, in
Linux, a simple for loop can be used:
Tools like fping allow users to send ICMP echo requests to multiple hosts
without waiting for each reply before moving on to the next host. This round-
robin approach increases efficiency when scanning large networks.
Nmap provides advanced options for ping sweeps, including the ability to use
TCP SYN packets instead of ICMP, which can bypass certain firewall
restrictions that block ICMP traffic.
Network Discovery: Ping sweeps are often used during the reconnaissance
phase of penetration testing to map out active devices within a network
segment.
1. Scan Types:
2. Port Specification:
3. Service Detection:
6. Output Options:
7. Miscellaneous Options:
8. Advanced Techniques:
Example Command
An example Nmap command using several switches might look like this:
text
In the context of ethical hacking, the SYN (synchronize) packet plays a crucial
role in establishing TCP connections through a process known as the TCP three-
way handshake. This process is fundamental to initiating reliable communication
between a client and a server.
1. SYN: The client sends a SYN packet to the server to initiate a connection.
This packet includes a sequence number, indicating the starting point for
data transmission.
2. SYN-ACK: Upon receiving the SYN packet, the server responds with a
SYN-ACK packet. This response acknowledges the receipt of the SYN
request and includes its own sequence number.
3. ACK: The client sends an ACK packet back to the server, confirming that
it received the SYN-ACK response. At this point, the connection is
established, and data transfer can begin.
Ethical hackers utilize the SYN packet and the three-way handshake for various
purposes, including:
While ethical hackers may use SYN packets for legitimate purposes, attackers
can exploit the same mechanism through a technique known as a SYN flood
attack. In this denial-of-service (DoS) attack, an attacker sends a large number
of SYN requests to a target server but never completes the handshake by sending
an ACK. This results in numerous half-open connections that consume server
resources, ultimately leading to service unavailability.
Rootkits: These are tools used to hide malicious software from detection
by antivirus programs and other security measures, allowing attackers to
maintain control over infected systems without being noticed.
1. Packet Construction: An XMAS scan sends packets with the FIN, URG, and
PSH flags set to 1. This combination of flags is non-standard and can
confuse some network security devices.
2. Response Analysis:
If a port is closed, the target will respond with a TCP RST (reset)
packet.
This behavior allows ethical hackers to infer the status of ports based on
whether they receive a response or not.
3. Stealthy Nature: Because XMAS scans do not use SYN packets (which are
common in other types of scans), they can sometimes evade detection by
firewalls and intrusion detection systems (IDS). This makes them useful
for ethical hackers looking to assess network security without triggering
alarms.
Low Detection Rate: Many basic IDS may not flag XMAS scans as
suspicious activity because they do not conform to typical scanning
patterns, allowing for more covert reconnaissance.
Limitations and Challenges
The term NULL in ethical hacking refers to a specific type of port scanning
technique known as a NULL scan. This method is used to identify open ports on a
target system by sending TCP packets that do not have any flags set in the TCP
header.
1. Packet Construction: In a NULL scan, packets are sent with no flags (SYN,
ACK, FIN, URG, or PSH) set. This means that the TCP packet is effectively
"empty" in terms of control flags.
2. Response Analysis:
Open Ports: Typically, open ports will not respond to the NULL
packet at all, as they do not recognize it as a valid request.
Closed Ports: Closed ports will respond with a TCP RST (reset)
packet, indicating that the port is not open.
Stealthy Technique: Because NULL scans do not use standard TCP flags,
they can sometimes bypass firewalls and intrusion detection systems that
are configured to monitor for more conventional traffic patterns.
Reconnaissance Tool: Ethical hackers can use NULL scans as part of their
reconnaissance efforts to map out network services without alerting
security measures.
Limitations
IDLE scan is a sophisticated TCP port scanning technique used in ethical hacking
to determine the status of ports on a target machine without revealing the
attacker's IP address. Instead, it leverages a third-party host, known as a
"zombie," to perform the scan. This method allows ethical hackers to conduct
reconnaissance while remaining stealthy and minimizing the risk of detection.
2. Initial IPID Probe: The attacker sends a packet to the zombie host to
capture its current IPID value. This value serves as a baseline for later
comparisons.
3. Sending SYN Packet: The attacker then forges a SYN packet from the
zombie's IP address to the target system's port of interest. Since the
SYN packet appears to originate from the zombie, the target responds as
if it is communicating with that host.
4. Target Response:
5. Zombie's Reaction: The zombie, upon receiving the SYN-ACK (or RST), will
send back an RST packet to reset the connection, which increments its
IPID value.
6. Final IPID Probe: The attacker probes the zombie host again to capture
its new IPID value. By comparing this new value with the initial one, the
attacker can determine whether the target port is open or closed:
Mapping Trust Relationships: IDLE scans can help ethical hackers uncover
trust relationships between machines in a network. For example, if a web
server has access to database services on another machine, this can be
identified through an IDLE scan using the web server as a zombie.
Limitations
1. Packet Construction: In a FIN scan, packets are sent with the FIN flag
set in the TCP header. The FIN flag is normally used to indicate that a
sender has finished sending data and wishes to terminate the connection.
2. Sending FIN Packets: The ethical hacker sends these FIN packets to
various ports on the target system. The response from the target helps
determine the status of each port:
Open Ports: If a port is open, it typically ignores the unsolicited FIN
packet and does not respond.
Reduced Detection Risk: Because it does not follow the standard SYN-
SYN/ACK-ACK handshake process, FIN scans are less likely to trigger
alerts in many IDS configurations, making them an effective tool for
stealthy assessments.
Useful for Network Diagnostics: Beyond ethical hacking, FIN scans can
also be employed for legitimate network diagnostics and troubleshooting,
helping administrators identify misconfigured or vulnerable services.
Limitations
Types of Anonymizers
HTTP tunneling techniques are methods used to encapsulate and transmit data
over HTTP or HTTPS protocols, allowing for communication between systems even
in environments with restrictive network policies. These techniques are
particularly useful in ethical hacking for bypassing firewalls, maintaining stealth,
and facilitating data exfiltration. HereÕs a detailed overview of HTTP tunneling
techniques and their applications in ethical hacking.
HTTP tunneling involves creating a network link between two computers through
an HTTP proxy server. This allows for the transmission of data that might
otherwise be blocked by firewalls or network restrictions. The most common
method used for HTTP tunneling is the HTTP CONNECT method, which enables
clients to establish a TCP connection through an HTTP proxy.
text
CONNECT targethost.com:443 HTTP/1.1
2. Proxy Handling: If the proxy server allows the connection, it responds with
a success message (e.g., HTTP/1.1 200 OK). The proxy then establishes a
connection to the specified host and port.
1. Packet Crafting:
3. Bypassing Authentication:
5. Botnet Operations:
6. Reconnaissance:
While often associated with malicious activities, there are legitimate applications
of IP spoofing in ethical hacking:
Before starting the enumeration process, itÕs crucial to define the scope of the
engagement. Ethical hackers must know which systems, services, and networks
they are authorized to test and which areas are off-limits. This ensures that the
enumeration process is focused and legal.
2.Identify Active Hosts:
Use tools like Nmap or Netcat to discover active hosts within the target network.
This step helps establish which devices are available for further probing.
Query the target systems to extract specific details such as operating system
types, versions, and configurations. Tools like SNMPwalk can be used to gather
this information.
Identify user accounts, group memberships, and roles within the system using
tools like enum4linux or NetBIOS enumeration techniques. This step helps
uncover potential weak points, especially if weak or default credentials are in use.
5.Service Enumeration:
Look for shared resources such as files, printers, or databases using protocols
like SMB (Server Message Block) or NFS (Network File System). Identifying
exposed shares can reveal sensitive information or facilitate lateral movement
within the network.
7.DNS Enumeration:
Query DNS records to discover subdomains, mail servers, and other related
services. This helps map out the attack surface and find hidden or overlooked
systems.
Analyze responses from the target systems to determine their operating system
type and version. Knowing the OS is crucial for targeting specific vulnerabilities
associated with that platform.
2. Dictionary Attack
This method uses a predefined list of words or phrases (a "dictionary") that are
commonly used as passwords. Attackers run through this list to find matches,
making it quicker than brute force for weak passwords. Variants of dictionary
attacks may include common substitutions (e.g., replacing 'a' with '@').
3. Credential Stuffing
4. Phishing
5. Keylogging
7. Social Engineering
8. Password Spraying
9. Malware
Malware can be used to gain access to systems and extract stored passwords
directly from files or databases. Some malware variants specifically target
password management software or browser-stored credentials.
10. Guessing
When it comes to passwords, various types can be used for authentication, each
with its own characteristics and security implications. HereÕs a detailed overview
of different types of passwords:
1. Static Passwords
Static passwords are the most common type of password. They are a fixed string
of characters that users create and must remember. These passwords can be
simple or complex, but they remain the same until the user decides to change
them.
2. Dynamic Passwords
Dynamic passwords change over time or with each login attempt. They are often
generated by algorithms and can be time-sensitive or session-based.
3. Biometric Passwords
Limitations: They can raise privacy concerns and may not work effectively
in all conditions (e.g., wet fingers for fingerprint scanners).
4. Graphical Passwords
Advantages: They can be easier for some users to remember than text-
based passwords.
5. Passphrases
Example: "MyDogLovesToPlayFetch@Park2025!"
6. Passwordless Authentication
This method allows users to log in without entering a password at all. Instead, it
relies on other forms of verification such as:
Email or SMS Links: Users receive a link via email or SMS that allows them
to log in directly.
7. Cognitive Passwords
Example: Users might answer questions like "What was your first pet's
name?"
3. Explain, spyware technologies in detail. (2023)
1. Adware
Characteristics:
2. Keyloggers
Types:
Risks: They can be used for identity theft and unauthorized access to
accounts.
3. Trojans
Characteristics:
Risks: They can lead to significant data breaches and system compromises.
4. Rootkits
Characteristics:
5. Stalkerware
Characteristics:
Risks: This type of spyware poses significant privacy violations and can be used
for harassment or stalking.
6. Browser Hijackers
Characteristics:
Risks: They can lead users to phishing sites or expose them to unwanted
advertisements.
4. What are the preventions used in root notes
Limiting user permissions reduces the attack surface for potential rootkit
installations. Users should only have the necessary privileges to perform their job
functions, minimizing the risk of unauthorized administrative access that could
facilitate rootkit deployment.
Traditional antivirus software may not effectively detect rootkits due to their
stealthy nature. Employing advanced threat detection solutions, such as endpoint
detection and response (EDR) tools, can help monitor system activities
continuously and identify suspicious behavior indicative of rootkits.
Rootkits often target the bootloader to gain control over the system during
startup. Utilizing Unified Extensible Firmware Interface (UEFI) instead of BIOS
can enhance boot security. Configuring systems to boot only from trusted sources
helps mitigate the risk of rootkit infections at startup.
6. Regular Backups
Cracked software often contains hidden malware, including rootkits. Users should
only download software from reputable sources and avoid pirated versions that
may compromise system security.
Ongoing training for users, especially those with administrative privileges, is vital
in recognizing potential threats and understanding safe computing practices. This
includes identifying phishing attempts, the importance of secure downloads, and
maintaining awareness of unusual system behavior.
DNS spoofing, also known as DNS cache poisoning, is a malicious technique used
to manipulate the Domain Name System (DNS) to redirect users to fraudulent
websites. This attack exploits vulnerabilities in the DNS infrastructure, allowing
attackers to alter DNS records and direct traffic away from legitimate
destinations. HereÕs an in-depth look at the techniques involved in DNS spoofing.
Process:
An attacker sends a forged DNS response to a DNS resolver
before it can receive a legitimate response from the
authoritative nameserver.
2. DNS Hijacking
Process:
Process:
Process:
5. ARP Spoofing
Process:
Protocols susceptible to sniffing are those that transmit data in plain text or
without adequate encryption, making it easy for attackers to intercept and read
sensitive information. Here are some of the key protocols vulnerable to sniffing:
2. HTTP:
Vulnerability: Like POP, FTP does not encrypt its traffic, allowing
attackers to capture user credentials and data.
ARP spoofing, also known as ARP poisoning or ARP cache poisoning, is a type of
cyber attack where an attacker sends falsified Address Resolution Protocol (ARP)
messages onto a local area network (LAN). The primary goal of this attack is to
associate the attacker's MAC (Media Access Control) address with the IP
address of a legitimate device on the network, such as a router or server. This
manipulation allows the attacker to intercept, modify, or block traffic intended
for the targeted device.
The device with the requested IP address responds with its MAC
address, which is then cached by the requesting device.
2. Spoofing Process:
Devices on the network update their ARP caches with this false
information, directing traffic intended for the legitimate device to
the attacker instead.
3. Attack Implications:
Definition: A MAC flooding attack is a type of cyber threat that targets network
switches by overwhelming their MAC address tables with a large number of fake
MAC addresses. This forces the switch to enter a "fail-open" mode, where it
broadcasts incoming traffic to all connected devices instead of directing it to the
intended recipient.
How It Works:
Secure Switches: Use switches with robust security features and large
MAC address tables.
Effect: If the forged response reaches the resolver before the legitimate
one, it updates its cache with the incorrect IP address, redirecting users
to malicious sites.
Effect: The DNS server responds with large DNS records to the target,
overwhelming it with traffic and causing a denial-of-service.
5. NXDOMAIN Attacks
6. DNS Tunneling
Effect: This allows them to bypass firewalls and exfiltrate sensitive data
or send commands to compromised systems.
1. SYN Flood:
3. UDP Flood:
5. Teardrop Attack:
6. Ping of Death:
3. Amplification:
Origin: The Smurf attack was originally developed by Dan Moschuk (alias
TFreak) in 1997. One of the first notable attacks occurred in 1998,
targeting the University of Minnesota and causing significant disruptions.
Impact: Smurf attacks can lead to network slowdowns, data loss, and
system crashes due to the overwhelming traffic.
Bots and botnets are related concepts in the realm of cybersecurity, but
they serve distinct roles and have different characteristics.
Bots
Key Differences
DoS/DDoS Countermeasures
2. Traffic Filtering:
3. Rate Limiting:
4. Anomaly Detection:
5. Behavioral Analysis:
9. Blackhole Routing:
Types of Spoofing
1. Email Spoofing:
2. Website/URL Spoofing:
3. Caller ID Spoofing:
5. GPS Spoofing:
7. DNS Spoofing:
8. ARP Spoofing:
9. Facial Spoofing:
1. Stay Vigilant:
3. Use Technology:
2. Cockpit Security:
2. Multi-Factor Authentication:
4. User Education:
Educate users about safe browsing practices and the risks of public
Wi-Fi.
Sniffing Countermeasures
1. Encryption
Tools: Use protocols like HTTPS, SSH, and SFTP instead of HTTP, Telnet,
and FTP.
Benefit: Especially useful on public Wi-Fi networks where sniffing risks are
higher.
3. Network Segmentation
4. Switched Networks
Benefit: Makes it harder for sniffers to capture traffic not intended for
them.
Technique: Use tools to monitor network traffic for anomalies and detect
potential sniffing attempts.
Q17. What is web server explain types of attacks against web server
A web server is a software application that runs on a computer and serves static
or dynamic content over the internet. It hosts websites, handles HTTP requests,
and provides access to web pages, images, and other resources. Common web
servers include Apache HTTP Server and Microsoft IIS.
Purpose: Ensures that all systems requiring patches are identified and
prioritized based on their role in business operations and risk profile.
2. Patch Monitoring
Purpose: Stays informed about new patches and ensures timely deployment.
3. Prioritization
Technique: Prioritize patches based on risk level, using metrics like CVSS
scores and potential business impact.
4. Testing
5. Deployment
6. Documentation
Technique: Document all patch deployments, including test results and any
issues encountered.
7. Rollback Planning
9. Risk-Based Management
Action: Keep the web server software, operating system, and all
dependencies up-to-date with the latest security patches.
Action: Disable features like HTTP Trace and Track requests that are not
necessary for your web server's operation.
Action: Conduct regular security audits to identify and address any new
vulnerabilities.
7. Misconfiguration Vulnerabilities:
8. Zero-Day Vulnerabilities:
Injection Attacks: These occur when malicious input is injected into a web
application, often targeting databases. SQL injection is a common type
where attackers manipulate backend databases to access sensitive
information.
The phases of web application hacking generally align with the broader hacking
methodology, which includes five main stages. These stages are applicable to
web applications as well as other types of systems. Here's how they apply to
web application hacking:
2. Scanning:
In this phase, hackers use tools to scan the web application for
vulnerabilities. This includes port scanning to identify open ports,
vulnerability scanning to detect known weaknesses, and network
mapping to understand the application's infrastructure. Tools like
Nessus and OpenVAS are commonly used for vulnerability scanning.
3. Gaining Access:
4. Maintaining Access:
5. Covering Tracks:
Web application threats are security risks that target web applications to
compromise data, disrupt service, or exploit vulnerabilities. These threats can
lead to significant financial losses, data breaches, and reputational damage. Here
are some common types of web application threats:
Description: Malicious scripts are injected into web pages to steal user
data or take control of user sessions.
9. Insecure Deserialization
a. Threats
Types of Threats:
Impact of Threats:
Compliance Issues: Failure to protect data can lead to legal and regulatory
penalties.
b. Malware
Types of Malware:
Spread of Malware:
Impact of Malware:
c. Phishing
Phishing is a type of social engineering attack where attackers deceive users into
revealing sensitive information, such as passwords or credit card numbers. This
is typically done via email or text messages that appear to be from a legitimate
source. Phishing attacks aim to trick users into performing actions that
compromise their security or the security of their organization.
Types of Phishing:
Email Phishing: The most common form, where attackers send emails that
appear to be from trusted sources.
Vishing: Uses voice calls to trick users into revealing sensitive information.
5. What is Google hacking. Methods involved in it (2024)
1. Advanced Search Operators: These are used to refine search queries and
target specific types of information. Common operators include:
2. Google Dork Queries: These are custom search strings designed to uncover
specific information. Examples include searching for log files, FTP servers,
or configuration files that may contain sensitive information.
Exploring FTP Servers: Queries like intitle: "index of" inurl:ftp can reveal
open FTP servers.
Use Robots.txt and Meta Tags: Configure these to control how search
engines index your site's content.
Input Validation and Sanitization: Ensure that user inputs are validated
and sanitized to prevent injection attacks and cross-site scripting (XSS).
Use parameterized queries for database interactions.
Code Reviews: Regularly review code to identify and fix potential security
issues.
5. Credential Stuffing: This involves using stolen credentials from one site to
try and access other sites, exploiting the tendency of users to reuse
passwords.
Importance of Authentication
Types of Authentication
5. Token-Based Authentication
3. Credential Stuffing: This involves using stolen credentials from one site to
try and access other sites, exploiting the tendency of users to reuse
passwords.
1. John the Ripper: A popular password cracking tool that can automatically
detect password hash types and supports a variety of cracking modes.
3. Hydra: A network login cracking tool that can perform brute-force attacks
on multiple protocols.
6. Hashcat: A fast and flexible password cracking tool that supports various
hash types and cracking modes.
Preventing Password Cracking
10. Define SQL injection and name it's types. (2019, 2023, 2024)
1. User Input: Attackers enter malicious SQL code into user input fields,
such as login forms or search boxes.
1. Classic SQL Injection: This involves injecting malicious SQL into user
inputs to manipulate database queries directly.
2. Blind SQL Injection: Attackers inject SQL without seeing the database
output directly. They infer responses based on the application's behavior.
5. Error-Based SQL Injection: This involves injecting SQL that causes error
messages, which can reveal database information.
Description: These occur when malicious SQL code is injected into user
inputs to manipulate database queries.
2. Unauthorized Access
3. Data Leakage
5. Database Exploitation
6. Privilege Escalation
Description: These occur when more data is written to a buffer than it can
hold, potentially allowing code execution.
Monitor and Audit: Regularly monitor for suspicious activity and maintain
detailed logs.
12. What is buffer overflow explain its types. (2023, 2024)
A buffer overflow occurs when a program attempts to write more data to a buffer
than it can hold. This excess data overflows into adjacent areas of memory,
potentially causing erratic program behavior, crashes, or even allowing malicious
code execution. Buffer overflows are a significant security concern because they
can be exploited by attackers to gain unauthorized access or control over
systems.
2. Data Overflow: More data is written to the buffer than its allocated size.
3. Integer Overflow:
Implement Bounds Checking: Ensure that data written to buffers does not
exceed their allocated size.
Use Safe Functions: Avoid using functions like gets() that do not perform
bounds checking; instead, use safer alternatives like fgets().
2. Data Overflow: More data is written to the buffer than its allocated
size, causing the excess data to spill over into adjacent stack memory.
Crafting Malicious Input: Creating input that overflows the buffer and
overwrites the return address with a pointer to attacker-controlled code.
Mutation Techniques
3. Polymorphism: Creating malware that can change its form with each
execution. This makes it challenging for traditional antivirus software to
detect, as the malware's signature changes constantly.
Countermeasures
1. Encryption Method: WEP uses the RC4 stream cipher for encrypting
data. Initially, it employed a 64-bit key, which was later extended to
support 128-bit and 256-bit keys for improved security.
3. Data Integrity: WEP uses the CRC-32 checksum algorithm to ensure data
integrity. This involves generating a 32-bit hash value from the data
being transmitted, which is checked at the receiving end to verify that
the data has not been altered during transmission.
Authentication Methods
Security Flaws
Despite its initial intentions, WEP has several significant security flaws:
Weak Encryption Keys: The use of static keys and short initialization
vectors makes it easier for attackers to crack the encryption using
brute-force methods or by exploiting weaknesses in the RC4 algorithm.
Key Reuse: The static nature of WEP keys means that all devices on the
network use the same key, which can be compromised if any device is
hacked.
Lack of Key Rotation: WEP does not dynamically change encryption keys,
making it vulnerable to prolonged attacks.
Method:
Use tools like Airgeddon or WiFi Pumpkin to clone the SSID and
BSSID of a genuine network.
Method:
Tools like Ettercap or BetterCAP to redirect traffic through the
attackerÕs device.
3. Packet Sniffing
Method:
Method:
Deploy devices like Wi-Fi jammers to flood the 2.4 GHz or 5 GHz
bands with noise.
5. MAC Spoofing
Method:
6. WEP/WPA Cracking
1. Encryption Method: WEP uses the RC4 stream cipher for encrypting data.
Initially, it employed a 64-bit key, which was later extended to support
128-bit and 256-bit keys for improved security. However, the effective
key length was typically 40 bits or 104 bits due to the use of a 24-bit
initialization vector (IV).
3. Data Integrity: WEP uses the CRC-32 checksum algorithm to ensure data
integrity. This involves generating a 32-bit hash value from the data being
transmitted, which is checked at the receiving end to verify that the data
has not been altered during transmission.
Authentication Methods
Security Flaws
Despite its initial intentions, WEP has several significant security flaws:
Weak Encryption Keys: The use of static keys and short initialization
vectors makes it vulnerable to brute-force attacks and exploits of the RC4
algorithm's weaknesses.
Static Keys: WEP uses static encryption keys, which are difficult to update
or change, making them susceptible to compromise.
Lack of Data Integrity Assurance: While WEP encrypts data, it does not
ensure that data packets are not modified in transit.
Authentication Process:
2. Four-Way Handshake:
The client and access point (AP) use the PSK to derive
a Pairwise Master Key (PMK).
2. WPA-Enterprise (802.1X/RADIUS)
RADIUS Server:
Key Derivation:
3. WPA3 Enhancements
4. Key Management
Encryption Standards:
WPA: Uses TKIP (Temporal Key Integrity Protocol) for dynamic key
rotation.
Dynamic Keys:
2. Authentication:
2. Packet Capture:
3. Channel Hopping:
5. Data Decryption:
6. Traffic Analysis:
1. Passive Sniffing:
2. Active Sniffing:
Methods:
A rogue access point (AP) is a wireless access point installed on a network without
the explicit authorization of the network administrator. These unauthorized
devices can be set up by malicious actors or unintentionally by employees seeking
to improve connectivity. Rogue APs pose significant security risks as they bypass
the network's security controls, potentially leading to data breaches, malware
infections, and unauthorized access.
Activities:
Methods:
o Active: Interact with the target (e.g., port scanning with Nmap,
network mapping).
Tools:
o Vulnerability scanners (e.g., Nessus, OpenVAS).
4. Vulnerability Assessment
5. Exploitation
Techniques:
Activities:
Deliverables:
2. Based on Scope
Tools: