ExamGecko
Home Home / ECCouncil / 312-50v12

ECCouncil 312-50v12 Practice Test - Questions Answers, Page 37

Question list
Search
Search

List of questions

Search

Related questions











Cross-site request forgery involves:

A.
A request sent by a malicious user from a browser to a server
A.
A request sent by a malicious user from a browser to a server
Answers
B.
Modification of a request by a proxy between client and server
B.
Modification of a request by a proxy between client and server
Answers
C.
A browser making a request to a server without the user's knowledge
C.
A browser making a request to a server without the user's knowledge
Answers
D.
A server making a request to another server without the user's knowledge
D.
A server making a request to another server without the user's knowledge
Answers
Suggested answer: C

Explanation:

https://owasp.org/www-community/attacks/csrf

Cross-Site Request Forgery (CSRF) is an attack that forces an end user to execute unwanted actions on a web application in which they're currently authenticated. With a little help of social engineering (such as sending a link via email or chat), an attacker may trick the users of a web application into executing actions of the attacker's choosing. If the victim is a normal user, a successful CSRF attack can force the user to perform state changing requests like transferring funds, changing their email address, and so forth. If the victim is an administrative account, CSRF can compromise the entire web application.

CSRF is an attack that tricks the victim into submitting a malicious request. It inherits the identity and privileges of the victim to perform an undesired function on the victim's behalf. For most sites, browser requests automatically include any credentials associated with the site, such as the user's session cookie, IP address, Windows domain credentials, and so forth. Therefore, if the user is currently authenticated to the site, the site will have no way to distinguish between the forged request sent by the victim and a legitimate request sent by the victim.

CSRF attacks target functionality that causes a state change on the server, such as changing the victim's email address or password, or purchasing something. Forcing the victim to retrieve data doesn't benefit an attacker because the attacker doesn't receive the response, the victim does. As such, CSRF attacks target state-changing requests.

It's sometimes possible to store the CSRF attack on the vulnerable site itself. Such vulnerabilities are called "stored CSRF flaws". This can be accomplished by simply storing an IMG or IFRAME tag in a field that accepts HTML, or by a more complex cross-site scripting attack. If the attack can store a CSRF attack in the site, the severity of the attack is amplified. In particular, the likelihood is increased because the victim is more likely to view the page containing the attack than some random page on the Internet. The likelihood is also increased because the victim is sure to be authenticated to the site already.

Which of the following is considered an exploit framework and has the ability to perform automated attacks on services, ports, applications and unpatched security flaws in a computer system?

A.
Wireshark
A.
Wireshark
Answers
B.
Maltego
B.
Maltego
Answers
C.
Metasploit
C.
Metasploit
Answers
D.
Nessus
D.
Nessus
Answers
Suggested answer: C

Explanation:

https://en.wikipedia.org/wiki/Metasploit_Project

The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development. It is owned by Boston, Massachusetts-based security company

Rapid7.

Its best-known sub-project is the open-source Metasploit Framework, a tool for developing and executing exploit code against a remote target machine. Other important sub-projects include the Opcode Database, shellcode archive and related research.

The Metasploit Project includes anti-forensic and evasion tools, some of which are built into the Metasploit Framework. Metasploit is pre-installed in the Kali Linux operating system.

The basic steps for exploiting a system using the Framework include.

1. Optionally checking whether the intended target system is vulnerable to an exploit.

2. Choosing and configuring an exploit (code that enters a target system by taking advantage of one of its bugs; about 900 different exploits for Windows, Unix/Linux and macOS systems are included).

3. Choosing and configuring a payload (code that will be executed on the target system upon successful entry; for instance, a remote shell or a VNC server). Metasploit often recommends a payload that should work.

4. Choosing the encoding technique so that hexadecimal opcodes known as "bad characters" are removed from the payload, these characters will cause the exploit to fail.

5. Executing the exploit.

This modular approach – allowing the combination of any exploit with any payload – is the major advantage of the Framework. It facilitates the tasks of attackers, exploit writers and payload writers.

A computer science student needs to fill some information into a secured Adobe PDF job application that was received from a prospective employer. Instead of requesting a new document that allowed the forms to be completed, the student decides to write a script that pulls passwords from a list of commonly used passwords to try against the secured PDF until the correct password is found or the list is exhausted.

Which cryptography attack is the student attempting?

A.
Man-in-the-middle attack
A.
Man-in-the-middle attack
Answers
B.
Brute-force attack
B.
Brute-force attack
Answers
C.
Dictionary attack
C.
Dictionary attack
Answers
D.
Session hijacking
D.
Session hijacking
Answers
Suggested answer: C

You are logged in as a local admin on a Windows 7 system and you need to launch the Computer Management Console from command line.

Which command would you use?

A.
c:\compmgmt.msc
A.
c:\compmgmt.msc
Answers
B.
c:\services.msc
B.
c:\services.msc
Answers
C.
c:\ncpa.cp
C.
c:\ncpa.cp
Answers
D.
c:\gpedit
D.
c:\gpedit
Answers
Suggested answer: A

Explanation:

To start the Computer Management Console from command line just type compmgmt.msc/computer:computername in your run box or at the command line and it should automatically open the Computer Management console.

References: http://www.waynezim.com/tag/compmgmtmsc/

Which of the following scanning method splits the TCP header into several packets and makes it difficult for packet filters to detect the purpose of the packet?

A.
ACK flag probe scanning
A.
ACK flag probe scanning
Answers
B.
ICMP Echo scanning
B.
ICMP Echo scanning
Answers
C.
SYN/FIN scanning using IP fragments
C.
SYN/FIN scanning using IP fragments
Answers
D.
IPID scanning
D.
IPID scanning
Answers
Suggested answer: C

Explanation:

SYN/FIN scanning using IP fragments is a process of scanning that was developed to avoid false positives generated by other scans because of a packet filtering device on the target system. The TCP header splits into several packets to evade the packet filter. For any transmission, every TCP header must have the source and destination port for the initial packet (8-octet, 64-bit). The initialized flags in the next packet allow the remote host to reassemble the packets upon receipt via an Internet protocol module that detects the fragmented data packets using field-equivalent values of the source, destination, protocol, and identification.

You have compromised a server and successfully gained a root access. You want to pivot and pass traffic undetected over the network and evade any possible Intrusion Detection System. What is the best approach?

A.
Use Alternate Data Streams to hide the outgoing packets from this server.
A.
Use Alternate Data Streams to hide the outgoing packets from this server.
Answers
B.
Use HTTP so that all traffic can be routed vis a browser, thus evading the internal IntrusionDetection Systems.
B.
Use HTTP so that all traffic can be routed vis a browser, thus evading the internal IntrusionDetection Systems.
Answers
C.
Install Cryptcat and encrypt outgoing packets from this server.
C.
Install Cryptcat and encrypt outgoing packets from this server.
Answers
D.
Install and use Telnet to encrypt all outgoing traffic from this server.
D.
Install and use Telnet to encrypt all outgoing traffic from this server.
Answers
Suggested answer: C

Explanation:

https://linuxsecurityblog.com/2018/12/23/create-a-backdoor-with-cryptcat/ Cryptcat enables us to communicate between two systems and encrypts the communication between them with twofish, one of many excellent encryption algorithms from Bruce Schneier et al.

Twofish's encryption is on par with AES encryption, making it nearly bulletproof. In this way, the IDS can't detect the malicious behavior taking place even when its traveling across normal HTTP ports like 80 and 443.

A hacker has successfully infected an internet-facing server which he will then use to send junk mail, take part in coordinated attacks, or host junk email content. Which sort of trojan infects this server?

A.
Botnet Trojan
A.
Botnet Trojan
Answers
B.
Banking Trojans
B.
Banking Trojans
Answers
C.
Turtle Trojans
C.
Turtle Trojans
Answers
D.
Ransomware Trojans
D.
Ransomware Trojans
Answers
Suggested answer: A

How can rainbow tables be defeated?

A.
Use of non-dictionary words
A.
Use of non-dictionary words
Answers
B.
All uppercase character passwords
B.
All uppercase character passwords
Answers
C.
Password salting
C.
Password salting
Answers
D.
Lockout accounts under brute force password cracking attempts
D.
Lockout accounts under brute force password cracking attempts
Answers
Suggested answer: C

Explanation:

https://en.wikipedia.org/wiki/Salt_(cryptography)

A salt is random data that is used as an additional input to a one-way function that hashes data, a password, or passphrase. Salts are used to safeguard passwords in storage. Historically a password was stored in plaintext on a system, but over time additional safeguards were developed to protect a user's password against being read from the system. A salt is one of those methods.

A new salt is randomly generated for each password. In a typical setting, the salt and the password (or its version after key stretching) are concatenated and processed with a cryptographic hash function, and the output hash value (but not the original password) is stored with the salt in a database. Hashing allows for later authentication without keeping and therefore risking exposure of the plaintext password in the event that the authentication data store is compromised.

Salts defend against a pre-computed hash attack, e.g. rainbow tables. Since salts do not have to be memorized by humans they can make the size of the hash table required for a successful attack prohibitively large without placing a burden on the users. Since salts are different in each case, they also protect commonly used passwords, or those users who use the same password on several sites, by making all salted hash instances for the same password different from each other.

Bob, your senior colleague, has sent you a mail regarding a deal with one of the clients. You are requested to accept the offer and you oblige. After 2 days, Bab denies that he had ever sent a mail.

What do you want to ""know"" to prove yourself that it was Bob who had send a mail?

A.
Non-Repudiation
A.
Non-Repudiation
Answers
B.
Integrity
B.
Integrity
Answers
C.
Authentication
C.
Authentication
Answers
D.
Confidentiality
D.
Confidentiality
Answers
Suggested answer: A

Explanation:

Non-repudiation is the assurance that someone cannot deny the validity of something. Nonrepudiation is a legal concept that is widely used in information security and refers to a service, which provides proof of the origin of data and the integrity of the data. In other words, nonrepudiation makes it very difficult to successfully deny who/where a message came from as well as the authenticity and integrity of that message.

Attempting an injection attack on a web server based on responses to True/False

A.
Compound SQLi
A.
Compound SQLi
Answers
B.
Blind SQLi
B.
Blind SQLi
Answers
C.
Classic SQLi
C.
Classic SQLi
Answers
D.
DMS-specific SQLi
D.
DMS-specific SQLi
Answers
Suggested answer: B

Explanation:

https://en.wikipedia.org/wiki/SQL_injection#Blind_SQL_injection

Blind SQL injection is used when a web application is vulnerable to an SQL injection but the results of the injection are not visible to the attacker. The page with the vulnerability may not be one that displays data but will display differently depending on the results of a logical statement injected into the legitimate SQL statement called for that page. This type of attack has traditionally been considered time-intensive because a new statement needed to be crafted for each bit recovered, and depending on its structure, the attack may consist of many unsuccessful requests. Recent advancements have allowed each request to recover multiple bits, with no unsuccessful requests, allowing for more consistent and efficient extraction.

Total 573 questions
Go to page: of 58