ExamGecko
Question list
Search
Search

Related questions











Question 542 - 312-50v12 discussion

Report
Export

As a part of an ethical hacking exercise, an attacker is probing a target network that is suspected to employ various honeypot systems for security. The attacker needs to detect and bypass these honeypots without alerting the target. The attacker decides to utilize a suite of techniques. Which of the following techniques would NOT assist in detecting a honeypot?

A.
Probing system services and observing the three-way handshake
Answers
A.
Probing system services and observing the three-way handshake
B.
Using honeypot detection tools like Send-Safe Honeypot Hunter
Answers
B.
Using honeypot detection tools like Send-Safe Honeypot Hunter
C.
Implementing a brute force attack to verify system vulnerability
Answers
C.
Implementing a brute force attack to verify system vulnerability
D.
Analyzing the MAC address to detect instances running on VMware
Answers
D.
Analyzing the MAC address to detect instances running on VMware
Suggested answer: C

Explanation:

A brute force attack is a method of trying different combinations of passwords or keys to gain access to a system or service. It is not a reliable way of detecting a honeypot, as it may trigger an alert or response from the target. Moreover, a brute force attack does not provide any information about the system's characteristics or behavior that could indicate a honeypot. A honeypot is a decoy system that is designed to attract and trap attackers, while providing security teams with valuable intelligence and insights. Therefore, an ethical hacker needs to use more subtle and stealthy techniques to detect and avoid honeypots.

The other options are valid techniques for detecting a honeypot. Probing system services and observing the three-way handshake can reveal anomalies or inconsistencies in the system's responses, such as abnormal banners, ports, or protocols. Using honeypot detection tools like Send-Safe Honeypot Hunter can scan the target network and identify potential honeypots based on various criteria, such as IP address, domain name, or open ports. Analyzing the MAC address can detect instances running on VMware, which is a common platform for deploying honeypots. A honeypot running on VMware will have a MAC address that starts with 00:0C:29, 00:50:56, or 00:05:69.Reference:

What is a Honeypot? Types, Benefits, Risks and Best Practices

Using Honeypots for Network Intrusion Detection

Detecting Honeypot Access With Varonis

asked 18/09/2024
Peter Klaffehn
45 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first