- (Topic 3)
You are conducting an idlescan manually using HPING2. During the scanning process, you notice that almost every query increments the IPID- regardless of the port being queried. One or two of the queries cause the IPID to increment by more than one value. Which of he following options would be a possible reason?
Correct Answer:
B
If the IPID increments more than one value that means that there has been network traffic between the queries so the zombie is not idle.
- (Topic 20)
In Buffer Overflow exploit, which of the following registers gets overwritten with return address of the exploit code?
Correct Answer:
A
EIP is the instruction pointer which is a register, it points to your next command.
- (Topic 19)
Which of the following are potential attacks on cryptography? (Select 3)
Correct Answer:
BCE
A chosen-ciphertext attack (CCA) is an attack model for cryptanalysis in which the cryptanalyst chooses a ciphertext and causes it to be decrypted with an unknown key. Specific forms of this attack are sometimes termed "lunchtime" or "midnight" attacks, referring to a scenario in which an attacker gains access to an unattended decryption machine. In cryptography, a man-in-the-middle attack (MITM) is an attack in which an attacker is able to read, insert and modify at will, messages between two parties without either party knowing that the link between them has been compromised. The attacker must be able to observe and intercept messages going between the two victims. A replay attack is a form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and retransmits it, possibly as part of a masquerade attack by IP packet substitution (such as stream cipher attack).
- (Topic 11)
Take a look at the following attack on a Web Server using obstructed URL:
http://www.example.com/script.ext?template....././etc/passwd
The request is made up of:
✑ ../.././% = ../../../
✑ etc = etc
✑ / = /
✑ passwd = passwd
How would you protect information systems from these attacks?
Correct Answer:
B
This is a typical Unicode attack. By configuring your IDS to trigger on strange Unicode requests you can protect your web-server from this type of attacks.
- (Topic 6)
What is a Trojan Horse?
Correct Answer:
B
A Trojan Horse is an apparently useful and innocent program containing additional hidden code which allows the unauthorized collection, exploitation, falsification, or destruction of data.