BSC CS SEM 6 Viva Question and Answers
Best way to get some brain exercise! Below are some questions that are from your own favourite subject and the syllabus. !
Best way to get some brain exercise! Below are some questions that are from your own favourite subject and the syllabus. !
Process of collecting information about system or network
Denial of Service, is aamalicious attack on network that is done by flooding the network with useless to traffic. Although, DOS does not cause any theft of the information or security breach, it can cost the website owner is great deal of money and time.
Phishing technique involves sending of false emails, chats or website to the impersonate real system with aim of stealing information from the original website.
ARP (Address Resolution Protocol) is a form of attack in which an attacker changes MAC ( Media Access Control) address and attacks an internet to LAN by changing the target computer’s ARP cache with a forged to ARP request and reply to packets.
The process of the extracting machine name, user names, network resources, shares and services from the system. Under Intranet environment enumeration techniques is conducted
Hacking: it defines the illegal way of accessing the system (Unauthorized Access Ethical hacking: Legal way of accessing the system (Penetration testing)
Reconnaissance / Scanning /Gaining Access / Maintaining Access / Clearing Tracks
Active and Passive Reconnaissance.
Malicious code which harms the system
Brute force hack is a technique for the hacking password and get access to the system and network resources, it takes much time, it needs toa hacker to learn about the JavaScripts. For this purpose, one can use of tool name is “Hydra”.
SQL injection is a vulnerability by which an attacker execute malicious SQL queries on the backend database by manipulating the input to the application.
Blind SQL Injection is a type of SQL injection where an attacker asks true and false questions to the database. Based on error messages, attacker craft more specific questions to the database to extract more information. This is little difficult to exploit, but not impossible.
Any input field like credit card number, account number etc. which extracts data from database by using where clause are the candidates of SQL injection. In addition to form fields, an attacker can use hidden fields and query strings for successful exploitation.
Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording the keys struck on a keyboard, typically covertly, so that person using the keyboard is unaware that their actions are being monitored. Data can then be retrieved by the person operating the logging program
There are two types of keyloggers, based on the method used to log keystrokes: software keyloggers and hardware keyloggers.
Keyloggers or keystroke loggers are software programs or hardware devices that track the activities (keys pressed) of a keyboard. ... Keylogger software typically stores your keystrokes in a small file, which is either accessed later or automatically emailed to the person monitoring your actions.
Ethical Hacking is when the individual is allowed to hacks the systems with the permission to the merchandise owner to search out of weakness in an exceedingly system and the later fix them.
IP address: To every device to an IP address is assigned, so that device can be located to the network. & MAC (Machine Access Control) address: A MAC address is the unique serial number assigned to the every network interface on every device.
Black hats: Using their skills for an offensive purpose , White hats: Using their skills to defend
NMAP. Nmap stands for Network Mapper. ... Metasploit. Metasploit is one of the most powerful exploit tools. ... Burp Suit. Burp Suite is a popular platform that is widely used for performing security testing of web applications. ... Angry IP Scanner. ... Cain & Abel. ... Ettercap. ... EtherPeek. ... SuperScan.
Domain name is the address of your website that people type in the browser URL bar to visit your website. In simple terms, if your website was a house, then your domain name will be its address.
Domain names are available in many different extensions. The most popular one is .com. There are many other options like .org, .net, .tv, .info, .io, and more. However we always recommend using .com domain extension.
Top level domain or TLD are generic domain extensions that are listed at the highest level in the domain name system. There are hundreds of TLDs, but the most popular ones are .com, .org, and .net.
Internet Corporation for Assigned Names and Numbers (ICANN) manages the domain names system. It is a non-profit organization that creates and implements the policies for domain names.
A subdomain is basically a child domain under the main domain name. For example, videos.wpbeginner.com is a subdomain of wpbeginner.com. Subdomains are commonly used by websites to create child-sites under the same domain name. For example, a business website can create a subdomain for their blog or their online store as store.example.com or blog.example.com
Some domain registrars allow you to cancel your domain registration at any time. If you cancel your registration, it will become available for others to register.Other domain name registrars allow you to simply let your domain registration expire.
When you register a domain name, the Internet Corporation for Assigned Names and Numbers (ICANN) requires your domain name registrar to submit your personal contact information to the WHOIS database. Once your listing appears in this online domain WHOIS directory, it is publicly available to anyone who chooses to check domain names using the WHOIS search tool.
"Individuals check domain names for expiration dates Registrars check domain names when transferring ownership Authorities check domain names when investigating criminal activity"
The type of information that can be gathered from Who is search are :
"Registrar – The company who registered the domain name Whois server – The URL Nameservers – for the domain name in question Expiration date Registrant name – Who registered the domain Email address Address – Registrant address IP address Technical Contact Telephone Number Fax Number"
CrypTool is an open source e-learning tool illustrating cryptographic and cryptanalytic concepts.
Cryptography is the study and application of techniques that hide the real meaning of information by transforming it into nonhuman readable formats and vice versa.
Cryptanalysis is the art of trying to decrypt the encrypted messages without the use of the key that was used to encrypt the messages.
This type of attack uses algorithms that try to guess all the possible logical combinations of the plaintext which are then ciphered and compared against the original cipher.
This type of attack uses a wordlist in order to find a match of either the plaintext or key. It is mostly used when trying to crack encrypted passwords.
This type of attack compares the cipher text against pre-computed hashes to find matches.
RC4– this algorithm is used to create stream ciphers. It is mostly used in protocols such as Secure Socket Layer (SSL) to encrypt internet communication and Wired Equivalent Privacy (WEP) to secure wireless networks.
This algorithm is used to create keyed, symmetrically blocked ciphers. It can be used to encrypt passwords and other data
This is the acronym for Message-Digest 5. It is used to create 128-bit hash values. Theoretically, hashes cannot be reversed into the original plain text. MD5 is used to encrypt passwords as well as check data integrity. MD5 is not collision resistant. Collision resistance is the difficulties in finding two values that produce the same hash values.
Cain and Abel (often abbreviated to Cain) is a password recovery tool for Microsoft Windows. It can recover many kinds of passwords using methods such as network packet sniffing, cracking various password hashes by using methods such as dictionary attacks, brute force and cryptanalysis attacks.
An ARP spoofing, also known as ARP poisoning, is a Man in the Middle (MitM) attack that allows attackers to intercept communication between network devices.
The ipconfig command is a fast way of determining your computer's IP address and other information, such as the address of its default gateway—useful if you want to know the IP address of your router's web interface. To use the command, just type ipconfig at the Command Prompt.
Ping is a command-line utility, available on virtually any operating system with network connectivity, that acts as a test to see if a networked device is reachable. The ping command sends a request over the network to a specific device.
The traceroute command, as the name implies, traces the route that packets takes to reach the host. It will show you how many hops it takes to reach the host and how long it took between each hop. This allows you to diagnose potential networking bottlenecks.
"It never determines open (or even open|filtered) ports. It is used to map out firewall rulesets, determining whether they are stateful or not and which ports are filtered Command: nmap -sA -T4 scanme.nmap.org.
Scan (-sS) SYN scan is the default and most popular scan option for good reason. It can be performed quickly, scanning thousands of ports per second on a fast network not hampered by intrusive firewalls. Command: nmap -p22,113,139 scanme.nmap.org
"Does not set any bits (TCP flag header is 0) Command: nmap –sN –p 22 scanme.nmap.org"
Wireshark is a packet sniffer and analysis tool. It captures network traffic on the local network and stores that data for offline analysis. Wireshark captures network traffic from Ethernet, Bluetooth What do you mean by network traffic Network traffic or data traffic is the amount of data moving across a network at a given point of time. Network data in computer networks is mostly encapsulated in network packets, which provide the load in the network.
Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. n network packets, which provide the load in the network.
Cross site scripting attacks can be broken down into two types: stored and reflected. Stored XSS, also known as persistent XSS, is the more damaging of the two.
SQL injection is a vulnerability by which an attacker execute malicious SQL queries on the backend database by manipulating the input to the application.
Blind SQL Injection is a type of SQL injection where an attacker asks true and false questions to the database. Based on error messages, attacker craft more specific questions to the database to extract more information. This is little difficult to exploit, but not impossible.
Any input field like credit card number, account number etc. which extracts data from database by using where clause are the candidates of SQL injection. In addition to form fields, an attacker can use hidden fields and query strings for successful exploitation.