ExamGecko
Home Home / ECCouncil / 312-50v12

ECCouncil 312-50v12 Practice Test - Questions Answers, Page 56

Question list
Search
Search

List of questions

Search

Related questions











A large corporate network is being subjected to repeated sniffing attacks. To increase security, the company's IT department decides to implement a combination of several security measures. They permanently add theMAC address of the gateway to the ARP cache, switch to using IPv6 instead of IPv4, implement the use of encrypted sessions such as SSH instead of Telnet, and use Secure File Transfer Protocol instead of FTP.

However, they are still faced with the threat of sniffing. Considering the countermeasures, what should be their next step to enhance network security?

A.
Use HTTP instead of HTTPS for protecting usernames and passwords
A.
Use HTTP instead of HTTPS for protecting usernames and passwords
Answers
B.
Implement network scanning and monitoring tools
B.
Implement network scanning and monitoring tools
Answers
C.
Enable network identification broadcasts
C.
Enable network identification broadcasts
Answers
D.
Retrieve MAC addresses from the OS
D.
Retrieve MAC addresses from the OS
Answers
Suggested answer: B

Explanation:

Sniffing attacks are a type of network attack that involves intercepting and analyzing data packets as they travel over a network. Sniffing attacks can be used to steal sensitive information, such as usernames, passwords, credit card numbers, etc. Sniffing attacks can also be used to perform reconnaissance, spoofing, or man-in-the-middle attacks.

The IT department of the company has implemented some security measures to prevent or mitigate sniffing attacks, such as:

Adding the MAC address of the gateway to the ARP cache: This prevents ARP spoofing, which is a technique that allows an attacker to redirect network traffic to their own device by sending fake ARP messages that associate their MAC address with the IP address of the gateway.

Switching to IPv6 instead of IPv4: This reduces the risk of IP spoofing, which is a technique that allows an attacker to send packets with a forged source IP address, pretending to be another device on the network.

Using encrypted sessions such as SSH instead of Telnet, and Secure File Transfer Protocol instead of FTP: This protects the data from being read or modified by an attacker who can capture the packets, as the data is encrypted and authenticated using cryptographic protocols.

However, these measures are not enough to completely eliminate the threat of sniffing, as an attacker can still use other techniques, such as:

Passive sniffing: This involves monitoring the network traffic without injecting any packets or altering the data. Passive sniffing can be done on a shared network, such as a hub, or on a switched network, using techniques such as MAC flooding, port mirroring, or VLAN hopping.

Active sniffing: This involves injecting packets or modifying the data to manipulate the network behavior or gain access to more traffic. Active sniffing can be done using techniques such as DHCP spoofing, DNS poisoning, ICMP redirection, or TCP session hijacking.

Therefore, the next step to enhance network security is to implement network scanning and monitoring tools, which can help detect and prevent sniffing attacks by:

Scanning the network for unauthorized devices, such as rogue access points, hubs, or sniffers, and removing them or isolating them from the network.

Monitoring the network for abnormal traffic patterns, such as excessive ARP requests, DNS queries, ICMP messages, or TCP connections, and alerting the network administrators or blocking the suspicious sources.

Analyzing the network traffic for malicious content, such as malware, phishing, or exfiltration, and filtering or quarantining the infected or compromised devices.

CEHv12 Module 05: Sniffing

Sniffing attacks - Types, Examples & Preventing it

How to Prevent and Detect Packet Sniffing Attacks

Understanding Sniffing in Cybersecurity and How to Prevent It

During a reconnaissance mission, an ethical hacker uses Maltego, a popular footprinting tool, to collect information about a target organization. The information includes the target's Internet infrastructure details (domains, DNS names, Netblocks, IP address information). The hacker decides to use social engineering techniques to gain further information. Which of the following would be the least likely method of social engineering to yield beneficial information based on the data collected?

A.
Shoulder surfing to observe sensitive credentials input on the target's computers
A.
Shoulder surfing to observe sensitive credentials input on the target's computers
Answers
B.
Impersonating an ISP technical support agent to trick the target into providing further network details
B.
Impersonating an ISP technical support agent to trick the target into providing further network details
Answers
C.
Dumpster diving in the target company's trash bins for valuable printouts
C.
Dumpster diving in the target company's trash bins for valuable printouts
Answers
D.
Eavesdropping on internal corporate conversations to understand key topics
D.
Eavesdropping on internal corporate conversations to understand key topics
Answers
Suggested answer: A

Explanation:

Shoulder surfing is a social engineering technique that involves looking over someone's shoulder to observe sensitive information, such as passwords, PINs, or credit card numbers, that they enter on their computer, phone, or ATM. It is the least likely method of social engineering to yield beneficial information based on the data collected by Maltego, because it requires physical proximity and access to the target's devices, which may not be feasible or safe for the hacker. Moreover, shoulder surfing does not leverage the information obtained by Maltego, such as domains, DNS names, Netblocks, or IP addresses, which are more relevant for network-based attacks.

The other options are more likely to yield beneficial information based on the data collected by Maltego, because they involve exploiting the target's trust, curiosity, or negligence, and using the information obtained by Maltego to craft convincing scenarios or messages. Impersonating an ISP technical support agent to trick the target into providing further network details is a form of pretexting, where the hacker creates a false identity and scenario to obtain information or access from the target. Dumpster diving in the target company's trash bins for valuable printouts is a technique that relies on the target's negligence or lack of proper disposal of sensitive documents, such as network diagrams, passwords, or confidential reports. Eavesdropping on internal corporate conversations to understand key topics is a technique that exploits the target's curiosity or lack of awareness, and allows the hacker to gather information about the target's projects, plans, or problems, which can be used for further attacks or extortion.Reference:

Social Engineering: Definition & 5 Attack Types

How to Use Maltego Transforms to Map Network Infrastructure: An In-Depth Guide

Social engineering: Definition, examples, and techniques

In the process of implementing a network vulnerability assessment strategy for a tech company, the security analyst is confronted with the following scenarios:

1) A legacy application is discovered on the network, which no longer receives updates from the vendor.

2) Several systems in the network are found running outdated versions of web browsers prone to distributed attacks.

3) The network firewall has been configured using default settings and passwords.

4) Certain TCP/IP protocols used in the organization are inherently insecure.

The security analyst decides to use vulnerability scanning software. Which of the following limitations of vulnerability assessment should the analyst be most cautious about in this context?

A.
Vulnerability scanning software is limited in its ability to perform live tests on web applications to detect errors or unexpected behavior
A.
Vulnerability scanning software is limited in its ability to perform live tests on web applications to detect errors or unexpected behavior
Answers
B.
Vulnerability scanning software cannot define the impact of an identified vulnerability on different business operations
B.
Vulnerability scanning software cannot define the impact of an identified vulnerability on different business operations
Answers
C.
Vulnerability scanning software is limited in its ability to detect vulnerabilities at a given point in time
C.
Vulnerability scanning software is limited in its ability to detect vulnerabilities at a given point in time
Answers
D.
Vulnerability scanning software is not immune to software engineering flaws that might lead to serious vulnerabilities being missed
D.
Vulnerability scanning software is not immune to software engineering flaws that might lead to serious vulnerabilities being missed
Answers
Suggested answer: D

Explanation:

Vulnerability scanning software is a tool that can help security analysts identify and prioritize known vulnerabilities in their systems and applications. However, it is not a perfect solution and has some limitations that need to be considered. One of the most critical limitations is that vulnerability scanning software is not immune to software engineering flaws that might lead to serious vulnerabilities being missed. This means that the software itself might have bugs, errors, or oversights that could affect its accuracy, reliability, or performance. For example, the software might:

Fail to detect some vulnerabilities due to incomplete or outdated databases, incorrect signatures, or insufficient coverage of the target system or application.

Produce false positives or false negatives due to misinterpretation of the scan results, incorrect configuration, or lack of context or validation.

Cause unintended consequences or damage to the target system or application due to intrusive or aggressive scanning techniques, such as exploiting vulnerabilities, modifying data, or crashing services.

Be vulnerable to attacks or compromise by malicious actors who could exploit its weaknesses, tamper with its functionality, or steal its data.

Therefore, the security analyst should be most cautious about this limitation of vulnerability scanning software, as it could lead to a false sense of security, missed opportunities for remediation, or increased exposure to threats. The security analyst should always verify the scan results, use multiple tools and methods, and update and patch the software regularly to mitigate this risk.

[CEHv12 Module 03: Vulnerability Analysis]

7 limitations of vulnerability scanners

The pros and cons of vulnerability scanning tools

In a large organization, a network security analyst discovered a series of packet captures that seem unusual.

The network operates on a switched Ethernet environment. The security team suspects that an attacker might be using a sniffer tool. Which technique could the attacker be using to successfully carry out this attack, considering the switched nature of the network?

A.
The attacker might be compromising physical security to plug into the network directly
A.
The attacker might be compromising physical security to plug into the network directly
Answers
B.
The attacker might be implementing MAC flooding to overwhelm the switch's memory
B.
The attacker might be implementing MAC flooding to overwhelm the switch's memory
Answers
C.
The attacker is probably using a Trojan horse with in-built sniffing capability
C.
The attacker is probably using a Trojan horse with in-built sniffing capability
Answers
D.
The attacker might be using passive sniffing, as it provides significant stealth advantages
D.
The attacker might be using passive sniffing, as it provides significant stealth advantages
Answers
Suggested answer: B

Explanation:

A sniffer tool is a software or hardware device that can capture and analyze network traffic. In a switched Ethernet environment, where each port on a switch is connected to a single device, a sniffer tool can only see the traffic that is destined for or originated from the device it is attached to. However, an attacker can use various techniques to overcome this limitation and sniff the traffic of other devices on the same network. One of these techniques is MAC flooding, which exploits the finite memory of the switch's MAC address table. The attacker sends a large number of frames with different source MAC addresses to the switch, which fills up the MAC address table and causes the switch to enter a fail-open mode, where it broadcasts all incoming frames to all ports, regardless of the destination MAC address. This way, the attacker can see all the traffic on the network and capture it with a sniffer tool.

The other options are less likely or less effective techniques for sniffing a switched Ethernet network. Compromising physical security to plug into the network directly may allow the attacker to sniff the traffic of the device they are connected to, but not the traffic of other devices on the network. Using a Trojan horse with in-built sniffing capability may allow the attacker to sniff the traffic of the infected device, but not the traffic of other devices on the network, unless the Trojan horse also performs MAC flooding or other techniques to bypass the switch. Using passive sniffing, which involves listening to the network traffic without sending any packets, may provide significant stealth advantages, but it does not help the attacker to see the traffic of other devices on the network, unless the switch is already in fail-open mode or the attacker uses other techniques to induce it.

Reference:

Sniffing: A Beginners Guide In 4 Important Points

How can I run a packet sniffer on a Router or Switch

Detection of Sniffers in an Ethernet Network

While performing a security audit of a web application, an ethical hacker discovers a potential vulnerability.

The application responds to logically incorrect queries with detailed error messages that divulge the underlying database's structure. The ethical hacker decides to exploit this vulnerability further. Which type of SQL Injection attack is the ethical hacker likely to use?

A.
UNION SQL Injection
A.
UNION SQL Injection
Answers
B.
Blind/inferential SQL Injection
B.
Blind/inferential SQL Injection
Answers
C.
In-band SQL Injection
C.
In-band SQL Injection
Answers
D.
Error-based SOL Injection
D.
Error-based SOL Injection
Answers
Suggested answer: D

Explanation:

Error-based SQL Injection is a type of in-band SQL Injection attack that relies on error messages thrown by the database server to obtain information about the structure of the database. In some cases, error-based SQL injection alone is enough for an attacker to enumerate an entire database.

The ethical hacker is likely to use this type of SQL Injection attack because the application responds to logically incorrect queries with detailed error messages that divulge the underlying database's structure. This means that the attacker can craft malicious SQL queries that trigger errors and reveal information such as table names, column names, data types, etc. The attacker can then use this information to construct more complex queries that extract data from the database.

For example, if the application uses the following query to display the username of a user based on the user ID:

SELECT username FROM users WHERE id = '$id'

The attacker can inject a single quote at the end of the user ID parameter to cause a syntax error:

SELECT username FROM users WHERE id = '1'

The application might display an error message like this:

You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near "1" at line 1

This error message reveals that the database server is MySQL and that the user ID parameter is enclosed in single quotes. The attacker can then use other techniques such as UNION, subqueries, or conditional statements to manipulate the query and retrieve data from other tables or columns.

[CEHv12 Module 05: Sniffing]

Types of SQL Injection (SQLi) - GeeksforGeeks

Types of SQL Injection? - Acunetix

A security analyst is preparing to analyze a potentially malicious program believed to have infiltrated an organization's network. To ensure the safety and integrity of the production environment, the analyst decided to use a sheep dip computer for the analysis. Before initiating the analysis, what key step should the analyst take?

A.
Run the potentially malicious program on the sheep dip computer to determine its behavior
A.
Run the potentially malicious program on the sheep dip computer to determine its behavior
Answers
B.
Store the potentially malicious program on an external medium, such as a CD-ROM
B.
Store the potentially malicious program on an external medium, such as a CD-ROM
Answers
C.
Connect the sheep dip computer to the organization's internal network
C.
Connect the sheep dip computer to the organization's internal network
Answers
D.
install the potentially malicious program on the sheep dip computer
D.
install the potentially malicious program on the sheep dip computer
Answers
Suggested answer: B

Explanation:

A sheep dip computer is a dedicated device that is used to test inbound files or physical media for viruses, malware, or other harmful content, before they are allowed to be used with other computers. The term sheep dip comes from a method of preventing the spread of parasites in a flock of sheep by dipping the new animals that farmers are adding to the flock in a trough of pesticide. A sheep dip computer is isolated from the organization's network and has port monitors, file monitors, network monitors, and antivirus software installed. Before initiating the analysis of a potentially malicious program, the analyst should store the program on an external medium, such as a CD-ROM, and then insert it into the sheep dip computer. This way, the analyst can prevent the program from infecting other devices or spreading over the network, and can safely analyze its behavior and characteristics.

The other options are not correct steps to take before initiating the analysis. Running the potentially malicious program on the sheep dip computer may cause irreversible damage to the device or compromise its security. Connecting the sheep dip computer to the organization's internal network may expose the network to the risk of infection or attack. Installing the potentially malicious program on the sheep dip computer may not be possible or advisable, as the program may require certain dependencies or permissions that the sheep dip computer does not have or allow.

Reference:

Sheep dip (computing)

What Does 'Sheep Dip' Mean in Cyber Security?

Malware Analysis

What is a Sheepdip?

A network security analyst, while conducting penetration testing, is aiming to identify a service account password using the Kerberos authentication protocol. They have a valid user authentication ticket (TGT) and decided to carry out a Kerberoasting attack. In the scenario described, which of the following steps should the analyst take next?

A.
Carry out a passive wire sniffing operation using Internet packet sniffers
A.
Carry out a passive wire sniffing operation using Internet packet sniffers
Answers
B.
Extract plaintext passwords, hashes, PIN codes, and Kerberos tickets using a tool like Mimikatz
B.
Extract plaintext passwords, hashes, PIN codes, and Kerberos tickets using a tool like Mimikatz
Answers
C.
Perform a PRobability INfinite Chained Elements (PRINCE) attack
C.
Perform a PRobability INfinite Chained Elements (PRINCE) attack
Answers
D.
Request a service ticket for the service principal name of the target service account
D.
Request a service ticket for the service principal name of the target service account
Answers
Suggested answer: D

Explanation:

A Kerberoasting attack is a technique that exploits the weak encryption of Kerberos service tickets to obtain the password hashes of service accounts that have a Service Principal Name (SPN) associated with them. The attacker can then crack the hashes offline and use the plaintext passwords to impersonate the service accounts and access network resources.

A Kerberoasting attack follows these steps1:

The attacker impersonates a legitimate Active Directory user and authenticates to the Key Distribution Center (KDC) in the Active Directory environment. They then request a Ticket Granting Ticket (TGT) from the KDC to access network resources. The KDC complies because the attacker is impersonating a legitimate user.

The attacker enumerates the service accounts that have an SPN using tools like GetUserSPNs.py or PowerView. They then request a service ticket for each SPN from the KDC using their TGT. The KDC grants the service tickets, which are encrypted with the password hashes of the service accounts.

The attacker captures the service tickets and takes them offline. They then attempt to crack the password hashes using tools like Hashcat or John the Ripper. They can use various methods, such as brute force, dictionary, or hybrid attacks, to guess the passwords.Alternatively, they can use a PRINCE attack, which is a probabilistic password generation technique that combines common words, patterns, and transformations to generate likely passwords2.

Once the attacker obtains the plaintext passwords of the service accounts, they can use them to authenticate as the service accounts and access the network resources that they are authorized to.

Therefore, the next step that the analyst should take after obtaining a valid TGT is to request a service ticket for the SPN of the target service account. This will allow them to capture the service ticket and extract the password hash of the service account.

How to Perform Kerberoasting Attacks: The Ultimate Guide - StationX

PRINCE: PRobability INfinite Chained Elements

As a security analyst for Sky Secure Inc., you are working with a client that uses a multi-cloud strategy, utilizing services from several cloud providers. The client wants to implement a system that will provide unified security management across all their cloud platforms. They need a solution that allows them to consistently enforce security policies, identify and respond to threats, and maintain visibility of all their cloud resources. Which of the following should you recommend as the best solution?

A.
Use a hardware-based firewall to secure all cloud resources.
A.
Use a hardware-based firewall to secure all cloud resources.
Answers
B.
implement separate security management tools for each cloud platform.
B.
implement separate security management tools for each cloud platform.
Answers
C.
Use a Cloud Access Security Broker (CASB).
C.
Use a Cloud Access Security Broker (CASB).
Answers
D.
Rely on the built-in security features of each cloud platform.
D.
Rely on the built-in security features of each cloud platform.
Answers
Suggested answer: C

Explanation:

A Cloud Access Security Broker (CASB) is a security policy enforcement point, either on-premises or in the cloud, that administers an organization's enterprise security policies when users attempt to access its cloud-based resources. A CASB can provide unified security management across multiple cloud platforms, as it can monitor cloud activity, enforce security policies, identify and respond to threats, and maintain visibility of all cloud resources. A CASB can also integrate with other security tools, such as data loss prevention (DLP), encryption, malware detection, and identity and access management (IAM), to enhance the security posture of the organization.

The other options are not as effective or feasible as using a CASB. Using a hardware-based firewall to secure all cloud resources may not be compatible with the dynamic and scalable nature of the cloud, as it may introduce latency, complexity, and cost. Implementing separate security management tools for each cloud platform may create inconsistency, inefficiency, and confusion, as each tool may have different features, interfaces, and configurations. Relying on the built-in security features of each cloud platform may not be sufficient or comprehensive, as each platform may have different levels of security, compliance, and functionality.Reference:

What Is a Cloud Access Security Broker (CASB)? | Microsoft

What Is a CASB? - Cloud Access Security Broker - Cisco

What is a Cloud Access Security Broker (CASB)?

During a red team engagement, an ethical hacker is tasked with testing the security measures of an organization's wireless network. The hacker needs to select an appropriate tool to carry out a session hijacking attack. Which of the following tools should the hacker use to effectively perform session hijacking and subsequent security analysis, given that the target wireless network has the Wi-Fi Protected Access-preshared key (WPA-PSK) security protocol in place?

A.
FaceNiff
A.
FaceNiff
Answers
B.
Hetty
B.
Hetty
Answers
C.
Droidsheep
C.
Droidsheep
Answers
D.
bettercap
D.
bettercap
Answers
Suggested answer: D

Explanation:

bettercap is a tool that can perform session hijacking attacks on wireless networks, among other network security and penetration testing tasks.bettercap can capture and manipulate network traffic, perform man-in-the-middle attacks, spoof and sniff protocols, inject custom payloads, and more1.

bettercap can perform session hijacking attacks on wireless networks that use the WPA-PSK security protocol by exploiting the four-way handshake process that occurs when a client connects to a wireless access point. The four-way handshake is used to establish a shared encryption key between the client and the access point, based on the pre-shared key (PSK) that is configured on both devices.However, the four-way handshake also exposes some information that can be used to crack the PSK offline, such as the nonce values, the MAC addresses, and the message integrity code (MIC) of the packets2.

bettercap can capture the four-way handshake packets using its Wi-Fi module and save them in a file. The file can then be fed to a tool like Hashcat or Aircrack-ng to crack the PSK using brute force or dictionary attacks.Once the PSK is obtained, bettercap can use it to decrypt the wireless traffic and perform session hijacking attacks on the clients connected to the access point3.

Therefore, bettercap is an appropriate tool to carry out a session hijacking attack on a wireless network that uses the WPA-PSK security protocol.

bettercap: the Swiss Army knife for 802.11, BLE and Ethernet networks reconnaissance and MITM attacks

How the WPA2 Enterprise Wireless Security Protocol Works

Cracking WPA/WPA2 Passwords with Bettercap and Hashcat

An IT security team is conducting an internal review of security protocols in their organization to identify potential vulnerabilities. During their investigation, they encounter a suspicious program running on several computers. Further examination reveals that the program has been logging all user keystrokes. How can the security team confirm the type of program and what countermeasures should be taken to ensure the same attack does not occur in the future?

A.
The program is a Trojan; the tearm should regularly update antivirus software and install a reliable firewall
A.
The program is a Trojan; the tearm should regularly update antivirus software and install a reliable firewall
Answers
B.
The program is spyware; the team should use password managers and encrypt sensitive data
B.
The program is spyware; the team should use password managers and encrypt sensitive data
Answers
C.
The program is a keylogger; the team should employ intrusion detection systems and regularly update the system software
C.
The program is a keylogger; the team should employ intrusion detection systems and regularly update the system software
Answers
D.
The program is a keylogger; the team should educate employees about phishing attacks and maintain regular backups
D.
The program is a keylogger; the team should educate employees about phishing attacks and maintain regular backups
Answers
Suggested answer: C

Explanation:

A keylogger is a type of spyware that can record and steal consecutive keystrokes (and much more) that the user enters on a device. Keyloggers are a common tool for cybercriminals, who use them to capture passwords, credit card numbers, personal information, and other sensitive data. Keyloggers can be installed on a device through various methods, such as phishing emails, malicious downloads, or physical access. To confirm the type of program, the security team can use a web search tool, such as Bing, to look for keylogger programs and compare their features and behaviors with the suspicious program they encountered. Alternatively, they can use a malware analysis tool, such as Malwarebytes, to scan and identify the program and its characteristics.

To prevent the same attack from occurring in the future, the security team should employ intrusion detection systems (IDS) and regularly update the system software. An IDS is a system that monitors network traffic and system activities for signs of malicious or unauthorized behavior, such as keylogger installation or communication. An IDS can alert the security team of any potential threats and help them respond accordingly. Regularly updating the system software can help patch any vulnerabilities or bugs that keyloggers may exploit to infect the device. Additionally, the security team should also remove the keylogger program from the affected computers and change any compromised passwords or credentials.Reference:

Keylogger | What is a Keylogger? How to protect yourself

How to Detect and Remove a Keylogger From Your Computer

Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)

What is a Keylogger? | Keystroke Logging Definition | Avast

Keylogger Software: 11 Best Free to Use in 2023

Total 573 questions
Go to page: of 58