IT Scholar BSC CS SEM 6 VIVA Q and A

Let's Study Together

BSC CS SEM 6 Viva Question and Answers

Best way to get some brain exercise! Below are some questions that are from your own favourite subject and the syllabus. !

ETHICAL HACKING


What is the footprinting in ethical hacking

Process of collecting information about system or network



Explain what is the DOS (Denial of service) attack?

Denial of Service, is aamalicious attack on network that is done by flooding the network with useless to traffic. Although, DOS does not cause any theft of the information or security breach, it can cost the website owner is great deal of money and time.



What is Phishing?

Phishing technique involves sending of false emails, chats or website to the impersonate real system with aim of stealing information from the original website.




Explain what is the ARP Spoofing or ARP poisoning?

ARP (Address Resolution Protocol) is a form of attack in which an attacker changes MAC ( Media Access Control) address and attacks an internet to LAN by changing the target computer’s ARP cache with a forged to ARP request and reply to packets.



Explain what is the Enumeration?

The process of the extracting machine name, user names, network resources, shares and services from the system. Under Intranet environment enumeration techniques is conducted



Difference between hacking Vs. Ethical Hacking.

Hacking: it defines the illegal way of accessing the system (Unauthorized Access Ethical hacking: Legal way of accessing the system (Penetration testing)



What are the different phases of ethical hacking?

Reconnaissance / Scanning /Gaining Access / Maintaining Access / Clearing Tracks




Different types of reconnaissance?

Active and Passive Reconnaissance.



What is Trojan?

Malicious code which harms the system



Explain what is Brute Force Hack?

Brute force hack is a technique for the hacking password and get access to the system and network resources, it takes much time, it needs toa hacker to learn about the JavaScripts. For this purpose, one can use of tool name is “Hydra”.



What is SQL Injection?

SQL injection is a vulnerability by which an attacker execute malicious SQL queries on the backend database by manipulating the input to the application.



What is Blind SQL Injection?

Blind SQL Injection is a type of SQL injection where an attacker asks true and false questions to the database. Based on error messages, attacker craft more specific questions to the database to extract more information. This is little difficult to exploit, but not impossible.




Apart from username and password which variables are candidates for SQL Injection?

Any input field like credit card number, account number etc. which extracts data from database by using where clause are the candidates of SQL injection. In addition to form fields, an attacker can use hidden fields and query strings for successful exploitation.



What is a key logger?

Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording the keys struck on a keyboard, typically covertly, so that person using the keyboard is unaware that their actions are being monitored. Data can then be retrieved by the person operating the logging program



Types of Key Logger?

There are two types of keyloggers, based on the method used to log keystrokes: software keyloggers and hardware keyloggers.



How does a key logger work?

Keyloggers or keystroke loggers are software programs or hardware devices that track the activities (keys pressed) of a keyboard. ... Keylogger software typically stores your keystrokes in a small file, which is either accessed later or automatically emailed to the person monitoring your actions.



Explain about Ethical Hacking?

Ethical Hacking is when the individual is allowed to hacks the systems with the permission to the merchandise owner to search out of weakness in an exceedingly system and the later fix them.



What is IP address and Mac address?

IP address: To every device to an IP address is assigned, so that device can be located to the network. & MAC (Machine Access Control) address: A MAC address is the unique serial number assigned to the every network interface on every device.




What are the types of the ethical hackers?

Black hats: Using their skills for an offensive purpose , White hats: Using their skills to defend



List out some of common tools used by Ethical hackers?

NMAP. Nmap stands for Network Mapper. ... Metasploit. Metasploit is one of the most powerful exploit tools. ... Burp Suit. Burp Suite is a popular platform that is widely used for performing security testing of web applications. ... Angry IP Scanner. ... Cain & Abel. ... Ettercap. ... EtherPeek. ... SuperScan.



What is Domain Name

Domain name is the address of your website that people type in the browser URL bar to visit your website. In simple terms, if your website was a house, then your domain name will be its address.



Different types of Domain Name

Domain names are available in many different extensions. The most popular one is .com. There are many other options like .org, .net, .tv, .info, .io, and more. However we always recommend using .com domain extension.




What is Top Level Domain - TLD ?

Top level domain or TLD are generic domain extensions that are listed at the highest level in the domain name system. There are hundreds of TLDs, but the most popular ones are .com, .org, and .net.



Who is Responsible for Domain Name System?

Internet Corporation for Assigned Names and Numbers (ICANN) manages the domain names system. It is a non-profit organization that creates and implements the policies for domain names.

What is a subdomain?

A subdomain is basically a child domain under the main domain name. For example, videos.wpbeginner.com is a subdomain of wpbeginner.com. Subdomains are commonly used by websites to create child-sites under the same domain name. For example, a business website can create a subdomain for their blog or their online store as store.example.com or blog.example.com



Can I cancel my registration of a domain name?

Some domain registrars allow you to cancel your domain registration at any time. If you cancel your registration, it will become available for others to register.Other domain name registrars allow you to simply let your domain registration expire.



What is WHOIS?

When you register a domain name, the Internet Corporation for Assigned Names and Numbers (ICANN) requires your domain name registrar to submit your personal contact information to the WHOIS database. Once your listing appears in this online domain WHOIS directory, it is publicly available to anyone who chooses to check domain names using the WHOIS search tool.




Name some third parties who check domain names in Who is Lookup database?

"Individuals check domain names for expiration dates Registrars check domain names when transferring ownership Authorities check domain names when investigating criminal activity"



What are the types of information that can be gathered from a Whois search

The type of information that can be gathered from Who is search are :

"Registrar – The company who registered the domain name
                            Whois server – The URL
                            Nameservers – for the domain name in question
                            Expiration date
                            Registrant name – Who registered the domain
                            Email address
                            Address – Registrant address
                            IP address
                            Technical Contact
                            Telephone Number
                            Fax Number"


What is cryptool?

CrypTool is an open source e-learning tool illustrating cryptographic and cryptanalytic concepts.



What is Cryptography?

Cryptography is the study and application of techniques that hide the real meaning of information by transforming it into nonhuman readable formats and vice versa.



What is cryptanalysis?

Cryptanalysis is the art of trying to decrypt the encrypted messages without the use of the key that was used to encrypt the messages.



What is Brute force attack?

This type of attack uses algorithms that try to guess all the possible logical combinations of the plaintext which are then ciphered and compared against the original cipher.




What is Dictionary attack?

This type of attack uses a wordlist in order to find a match of either the plaintext or key. It is mostly used when trying to crack encrypted passwords.



What is Rainbow table attack?

This type of attack compares the cipher text against pre-computed hashes to find matches.



Explain RC4 algorithm.

RC4– this algorithm is used to create stream ciphers. It is mostly used in protocols such as Secure Socket Layer (SSL) to encrypt internet communication and Wired Equivalent Privacy (WEP) to secure wireless networks.



Explain Blowfish algorithm.

This algorithm is used to create keyed, symmetrically blocked ciphers. It can be used to encrypt passwords and other data



MD5 encryption algorithm?

This is the acronym for Message-Digest 5. It is used to create 128-bit hash values. Theoretically, hashes cannot be reversed into the original plain text. MD5 is used to encrypt passwords as well as check data integrity. MD5 is not collision resistant. Collision resistance is the difficulties in finding two values that produce the same hash values.



What is cain and able used for?

Cain and Abel (often abbreviated to Cain) is a password recovery tool for Microsoft Windows. It can recover many kinds of passwords using methods such as network packet sniffing, cracking various password hashes by using methods such as dictionary attacks, brute force and cryptanalysis attacks.




What do you understand by the term ARP POISONING?

An ARP spoofing, also known as ARP poisoning, is a Man in the Middle (MitM) attack that allows attackers to intercept communication between network devices.



Explain - ipconfig

The ipconfig command is a fast way of determining your computer's IP address and other information, such as the address of its default gateway—useful if you want to know the IP address of your router's web interface. To use the command, just type ipconfig at the Command Prompt.

What does ping command do?

Ping is a command-line utility, available on virtually any operating system with network connectivity, that acts as a test to see if a networked device is reachable. The ping command sends a request over the network to a specific device.



What does traceroute command do?

The traceroute command, as the name implies, traces the route that packets takes to reach the host. It will show you how many hops it takes to reach the host and how long it took between each hop. This allows you to diagnose potential networking bottlenecks.



Explain ACK -sA (TCP ACK scan)

"It never determines open (or even open|filtered) ports. It is used to map out firewall rulesets, determining whether they are stateful or not and which ports are filtered Command: nmap -sA -T4 scanme.nmap.org.



Explain SYN (Stealth)

Scan (-sS) SYN scan is the default and most popular scan option for good reason. It can be performed quickly, scanning thousands of ports per second on a fast network not hampered by intrusive firewalls. Command: nmap -p22,113,139 scanme.nmap.org



Explain NULL Scan (-sN)

"Does not set any bits (TCP flag header is 0) Command: nmap –sN –p 22 scanme.nmap.org"



What is Wireshark tool?

Wireshark is a packet sniffer and analysis tool. It captures network traffic on the local network and stores that data for offline analysis. Wireshark captures network traffic from Ethernet, Bluetooth What do you mean by network traffic Network traffic or data traffic is the amount of data moving across a network at a given point of time. Network data in computer networks is mostly encapsulated in network packets, which provide the load in the network.




What is Cross Site Scripting?

Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. n network packets, which provide the load in the network.



What are the two types of cross site attacks?

Cross site scripting attacks can be broken down into two types: stored and reflected. Stored XSS, also known as persistent XSS, is the more damaging of the two.



What is SQL Injection?

SQL injection is a vulnerability by which an attacker execute malicious SQL queries on the backend database by manipulating the input to the application.



What is Blind SQL Injection?

Blind SQL Injection is a type of SQL injection where an attacker asks true and false questions to the database. Based on error messages, attacker craft more specific questions to the database to extract more information. This is little difficult to exploit, but not impossible.



Apart from username and password which variables are candidates for SQL Injection?

Any input field like credit card number, account number etc. which extracts data from database by using where clause are the candidates of SQL injection. In addition to form fields, an attacker can use hidden fields and query strings for successful exploitation.