Ethical Hacking.pdf
Ethical Hacking.pdf
Ethical Hacking.pdf
1. Evolving Threats: Cyber threats are constantly changing, with new vulnerabilities and
attack vectors emerging. Regular testing helps identify these risks.
1. Session Sniffing: The attacker intercepts session tokens or cookies sent over the network,
usually through packet sniffing techniques.
2. Session Fixation: The attacker tricks the user into using a specific session ID that the
attacker knows, allowing them to gain control once the user logs in.
3. Session Takeover: The attacker uses the captured session ID or token to impersonate the
user and access their account or sensitive information.
Q2.
A. Explain the different types of hackers. Explain in detail the different types of attacks
carried out by hackers? (10)
Types of Hackers:
1. White Hat Hackers: Ethical hackers who test systems for vulnerabilities to help
organizations improve security.
2. Black Hat Hackers: Malicious hackers who exploit vulnerabilities for personal gain or
to cause harm.
3. Grey Hat Hackers: Operate between white and black hats; they may exploit
vulnerabilities but report them instead of exploiting them for malicious purposes.
4. Script Kiddies: Inexperienced hackers who use existing tools and scripts to carry out
attacks without deep understanding.
Types of Attacks:
• Phishing: Deceptive emails or messages to steal sensitive information.
• Malware Attacks: Using malicious software like viruses, worms, or ransomware.
• Denial of Service (DoS): Overloading systems to make them unavailable.
• SQL Injection: Exploiting vulnerabilities in applications to manipulate databases.
• Man-in-the-Middle (MitM): Intercepting communications between two parties to steal
data.
B. What are the different types of threats due to foot printing? Explain in brief. (10)
Footprinting is the reconnaissance phase of hacking where attackers gather information about a
target system.
Types of Threats:
Q3.
A. What are different types of Trojans? Explain each in brief. (10)
3. RATs (Remote Access Trojans): Allow attackers to control infected machines remotely,
capturing keystrokes and accessing files.
4. Downloader Trojans: Download and install additional malicious software onto the
infected system.
5. Rootkit Trojans: Hide their presence and maintain control over a compromised system
without detection.
B. What is network scanning? Explain different Types of Scanning and objectives of
network scanning. (10)
Network Scanning is a process used to identify active devices on a network and their associated
vulnerabilities.
Types of Scanning:
1. Ping Scanning: Determines which devices are online by sending ICMP echo requests.
2. Port Scanning: Identifies open ports on a device to discover services running and
potential vulnerabilities.
3. Service Scanning: Identifies services running on open ports to ascertain versions and
possible vulnerabilities.
4. OS Fingerprinting: Determines the operating system running on a device based on
responses to network probes.
Objectives of Network Scanning:
• Identify active devices for network management.
• Assess security posture by uncovering open ports and services.
• Map the network for inventory purposes.
• Detect vulnerabilities that could be exploited.
Q4.
A. What information can be enumerated by intruders? Explain the different enumeration
techniques. (10)
Information that can be enumerated includes:
• Usernames and user groups
• Network shares and their permissions
• Services running on hosts
• System and application versions
• Active devices on the network
Enumeration Techniques:
2. NetBIOS Enumeration: Exploiting the NetBIOS service to extract user and share
information from Windows systems.
1. Brute Force Attack: Systematically trying all possible combinations until the correct one
is found.
2. Dictionary Attack: Using a list of common passwords or phrases to guess the password.
3. Credential Stuffing: Utilizing leaked username/password combinations from other
breaches to gain access.
Q5.
A. Explain the need for cloud computing? What are the different types of cloud
computing? (10)
Need for Cloud Computing:
1. Cost Efficiency: Reduces the need for physical hardware and maintenance, lowering
overall IT costs.
1. Public Cloud: Services offered over the public internet, available to anyone, such as
AWS or Google Cloud.
2. Private Cloud: Dedicated infrastructure for a single organization, offering more control
and security.
3. Hybrid Cloud: Combination of public and private clouds, allowing data and applications
to be shared between them.
3. Secure Communication: Sending covert messages that are less likely to be intercepted.
4. Intellectual Property Protection: Hiding proprietary information within files to prevent
unauthorized use.
Types of Steganography:
1. Image Steganography: Hiding data within image files by manipulating pixel values.
2. Audio Steganography: Concealing information within audio files through techniques
like LSB (Least Significant Bit).
3. Video Steganography: Embedding messages within video files, often using frame
manipulation.
Q6.
A. Explain SQL injection. What are its countermeasures? (10)
SQL Injection is a code injection technique that allows attackers to manipulate a web
application's database by injecting malicious SQL code through input fields.
Countermeasures:
2. Input Validation: Ensuring all input is validated and sanitized before being processed.
3. Stored Procedures: Utilizing stored procedures to encapsulate SQL queries, reducing
exposure to injections.
5. Web Application Firewalls (WAFs): Deploying WAFs to filter and monitor incoming
traffic for SQL injection patterns.
B. Explain in detail DoS and DDoS attacks. (10)
DoS (Denial of Service): An attack designed to make a service unavailable by overwhelming it
with traffic, rendering it unable to respond to legitimate requests. This can be achieved through
various methods, such as flooding a server with requests.
DDoS (Distributed Denial of Service): Similar to DoS but involves multiple compromised
systems (often part of a botnet) attacking a single target, making it harder to mitigate. DDoS
attacks can cause significant disruption and require extensive resources to defend against.
Key Characteristics:
• Impact: Both attacks aim to disrupt service, but DDoS attacks are typically more severe
due to the distributed nature.
• Mitigation: Addressing DoS might involve rate limiting or blacklisting IPs, while DDoS
requires more robust measures like traffic filtering and advanced mitigation solutions.
1. White Hat Hackers: Ethical hackers who use their skills for defensive purposes. They
help organizations improve security by identifying vulnerabilities through penetration
testing.
2. Black Hat Hackers: Malicious hackers who exploit vulnerabilities for personal gain,
causing harm to individuals or organizations.
3. Grey Hat Hackers: Operate between ethical and unethical; they may exploit
vulnerabilities without permission but often report them to the organization afterward.
4. Script Kiddies: Inexperienced hackers who use pre-existing scripts or tools to conduct
attacks without understanding the underlying technology.
5. Hacktivists: Hackers who use their skills for political or social activism, often defacing
websites or leaking sensitive information to promote their causes.
b. Phases of Hacking (05)
5. Covering Tracks: Deleting logs or using techniques to hide evidence of the attack to
avoid detection.
c. Indian IT Act 2000 (05)
The Indian IT Act 2000 is a legislation that aims to provide legal recognition to electronic
transactions and to facilitate e-governance in India. Key features include:
• Digital Signatures: Legal recognition for digital signatures, ensuring secure electronic
communication.
• Cyber Crimes: Defining various cybercrimes, including hacking, data theft, and identity
theft, along with penalties.
• Regulation of Certifying Authorities: Establishing guidelines for the certification of
digital signatures.
• Adjudication and Appellate Tribunal: Provision for adjudication of disputes and
establishment of an appellate tribunal to handle grievances.
d. Enumeration Techniques (05)
Enumeration involves gathering information about a target system to identify user accounts,
services, and network resources. Key techniques include:
2. NetBIOS Enumeration: Gathering data from Windows networks, including user names
and shared resources.
1. Public Cloud: Services offered over the public internet, accessible to anyone, like AWS
or Google Cloud.
3. Hybrid Cloud: Combination of public and private clouds, allowing data and applications
to be shared between them.
Q2.
a. Explain SQL Injection with Examples (10)
SQL Injection is a web security vulnerability that allows attackers to interfere with the queries
an application makes to its database. By injecting malicious SQL code, attackers can manipulate
databases to retrieve, modify, or delete data.
Example: Consider a login form that uses the following SQL query to authenticate users:
sql
Copy code
SELECT * FROM users WHERE username = 'user_input' AND password =
'pass_input';
If an attacker inputs:
vbnet
Copy code
Username: admin' OR '1'='1
Password: anything
Q3.
a. What is DoS attack? Explain any two types of DoS attacks. (10)
A Denial of Service (DoS) attack aims to make a service unavailable to its intended users by
overwhelming the system with excessive traffic or requests.
Types of DoS Attacks:
1. SYN Flood: Exploits the TCP handshake by sending SYN requests without completing
the handshake. This fills the target's connection table, preventing legitimate users from
connecting.
2. HTTP Flood: Targets web servers by sending a large number of HTTP requests,
overwhelming the server’s resources and making the website slow or unresponsive.
b. Explain types of wireless Architecture and wireless encryption techniques-WEP and
WPA (10)
Types of Wireless Architecture:
Q4.
a. What are different types of viruses? Explain each in brief. (10)
1. File Infector Virus: Attaches itself to executable files and spreads when the infected file
is run.
o Example: CIH (Chernobyl) virus, which can overwrite critical system files.
2. Macro Virus: Infects documents and templates, primarily in applications like Microsoft
Word or Excel, exploiting macro features.
o Example: Melissa virus, which spread through infected email attachments.
3. Boot Sector Virus: Infects the master boot record of a hard drive, executing when the
computer starts.
o Example: Stone virus, which spreads via floppy disks.
4. Polymorphic Virus: Changes its code each time it infects a new file, making it difficult
to detect by antivirus software.
o Example: Storm Worm, which altered its code to avoid detection.
5. Resident Virus: Embeds itself into the system memory and can infect files even when
the original host program is not running.
o Example: Randex virus, which modifies files after infection.
b. Explain man in the middle attack and waterhole attack. (10)
• Man-in-the-Middle (MitM) Attack: An attacker secretly intercepts and relays messages
between two parties who believe they are communicating directly. This can involve
eavesdropping, altering messages, or impersonating one of the parties.
o Example: An attacker intercepting a session between a user and a banking website
to capture login credentials.
• Waterhole Attack: A targeted attack where the attacker compromises a website that is
frequented by a specific group or organization, infecting it with malware. When members
of the target group visit the site, their devices get infected.
o Example: Compromising a legitimate site used by employees of a company,
leading to malware installation on their devices when they visit.
Q5.
a. Explain the IT 2008 Amendment act with at least 2 case studies. (10)
The IT (Amendment) Act 2008 introduced changes to the original IT Act 2000, enhancing
cybersecurity and defining new cybercrimes. Key amendments include:
• Cyber Crimes: Expanding the definition of cybercrimes to include identity theft, cyber
terrorism, and violations of privacy.
• Data Protection: Imposing stricter penalties for data breaches and unauthorized access.
Case Studies:
2. Data Breach Incident: A major Indian bank faced a data breach where customer
information was exposed. The incident led to the enforcement of stringent data protection
measures under the amended act, including penalties for negligence.
b. What is session hijacking? Explain its countermeasures. (10)
Session Hijacking is an attack where an attacker takes control of a user's active session by
stealing session tokens or cookies. This allows the attacker to impersonate the user and access
sensitive information.
Countermeasures:
1. Secure Cookies: Use secure flags for cookies to prevent them from being transmitted
over unencrypted connections.
2. Session Timeouts: Implement timeouts for inactive sessions to minimize the risk of
hijacking.
5. Regular Token Renewal: Regularly refresh session tokens to limit the window of
opportunity for attackers.
Q6.
a. What is Steganography? Explain Types of Steganography. (10)
Steganography is the practice of hiding secret information within other non-secret data to avoid
detection. It allows for covert communication, as the presence of the hidden message is
concealed.
Types of Steganography:
1. Image Steganography: Hiding data within images by altering pixel values (e.g., Least
Significant Bit technique).
2. Audio Steganography: Concealing information within audio files, often by modifying
the least significant bits of audio samples.
4. Text Steganography: Hiding messages within text files, often by using specific
formatting or manipulating word patterns.
b. What is sniffing? Explain different sniffing tools and its countermeasures. (10)
Sniffing is the act of intercepting and analyzing network traffic to capture sensitive information
such as passwords, emails, and data packets.
Sniffing Tools:
1. Wireshark: A popular network protocol analyzer that allows users to capture and
interactively browse traffic on a computer network.
2. tcpdump: A command-line packet analyzer that provides the ability to capture and
display packets being transmitted or received over a network.
1. Encryption: Use protocols like SSL/TLS to encrypt data in transit, making it difficult for
attackers to read intercepted data.
3. Network Segmentation: Divide the network into segments to limit access and control
data flow, reducing the risk of sniffing attacks.
4. Intrusion Detection Systems (IDS): Deploy IDS to monitor network traffic for
suspicious activity and potential sniffing attempts.
Q1. Write short notes on:
A. Email Spoofing and Phishing
Email Spoofing is the creation of email messages with a forged sender address, typically to
deceive the recipient into believing the message is from a trusted source. This can lead to various
attacks, such as phishing.
Phishing is a type of cyber attack where attackers attempt to acquire sensitive information (like
usernames, passwords, or credit card details) by masquerading as a trustworthy entity in
electronic communications. Phishing can occur through emails, messages, or fake websites, often
luring victims with enticing offers or urgent requests.
B. ID Theft
Identity Theft occurs when someone unlawfully obtains and uses another person’s personal
information, typically for financial gain. This can include stealing credit card numbers, Social
Security numbers, or bank account details. ID theft can lead to financial loss, damaged credit
ratings, and significant stress for the victim. Preventive measures include monitoring credit
reports, using strong passwords, and being cautious about sharing personal information.
C. Computer Sabotage
Computer Sabotage refers to the intentional destruction, alteration, or disruption of a computer
system, software, or data. This can manifest as deploying malware, launching DoS attacks, or
physically damaging hardware. Sabotage can be perpetrated by disgruntled employees, hackers,
or external threats and can result in substantial financial and operational damage to
organizations.
D. Cyber Defamation
Cyber Defamation involves spreading false statements about an individual or organization
through digital platforms, leading to harm to their reputation. This can occur via social media,
blogs, or websites and can result in significant personal and professional consequences for the
victim. Legal recourse may be available, but proving defamation in the online context can be
challenging due to issues like anonymity.
Q2.
A. What is Cyber crime against society? Explain in detail. (10)
Cyber Crime against Society encompasses a range of illegal activities conducted via the
internet that can harm individuals, communities, or the broader society. These crimes include:
1. Online Fraud: This includes scams like lottery fraud, advance-fee fraud, and auction
fraud, where individuals are deceived into giving money or personal information.
4. Hate Crimes: Utilizing the internet to spread hate speech or incite violence against
individuals or groups based on race, religion, or sexual orientation.
5. Terrorism: The use of the internet to promote terrorist activities, recruit members, or
disseminate propaganda.
The impact of these crimes can be extensive, leading to societal fear, economic losses, and a
decrease in the overall sense of safety in online environments.
B. Explain network scanning and its types in detail. (10)
Network Scanning is a process used to discover active devices on a network and identify their
services and vulnerabilities. It is a critical step in penetration testing and network management.
Types of Network Scanning:
1. Ping Scanning: Identifies live hosts by sending ICMP echo requests. If a response is
received, the host is considered active.
2. Port Scanning: Detects open ports on devices to find services running and potential
vulnerabilities. Tools like Nmap can be used for this purpose.
3. Service Scanning: Goes a step further than port scanning to identify specific services
running on open ports, allowing for detailed vulnerability assessments.
Q3.
A. What is footprinting? Explain types of footprinting & purpose of footprinting in detail.
(10)
Footprinting is the initial stage of an attack where information is gathered about a target system
or organization. This reconnaissance helps attackers understand the target's structure, identify
potential vulnerabilities, and plan their approach.
Types of Footprinting:
1. Active Footprinting: Involves actively engaging with the target system to collect
information. This can include pinging servers, performing DNS queries, or using port
scanners.
1. Telnet: Connecting to a specific port using Telnet can reveal service banners. For
example, connecting to an HTTP server (port 80) can yield the server type and version.
2. Netcat: A versatile networking utility that can create TCP/UDP connections, allowing
users to grab banners from services running on specified ports.
3. Nmap: This network scanner has built-in capabilities for banner grabbing, using scripts
to identify service versions and configurations.
4. HTTP Requests: Sending crafted HTTP requests (like HEAD or OPTIONS) to a web
server can reveal server information in the response headers.
5. FTP Commands: Connecting to an FTP server and issuing the USER command can return
the server's banner information.
Banner grabbing helps security professionals and attackers assess the security posture of a target
by identifying outdated or vulnerable services.
Q4.
A. What is SQL Injection? Explain SQL Injection attack & prevention. (10)
SQL Injection is a type of cyber attack that exploits vulnerabilities in an application's software
by injecting malicious SQL queries. It allows attackers to manipulate database queries, gaining
unauthorized access to data or modifying it.
SQL Injection Attack: For example, consider a vulnerable login form that uses the following
SQL query:
sql
Copy code
SELECT * FROM users WHERE username = 'user_input' AND password =
'pass_input';
If an attacker inputs:
vbnet
Copy code
Username: admin' --
Password: anything
The -- comment syntax makes the rest of the query ignored, potentially allowing unauthorized
access.
Prevention Measures:
1. Prepared Statements: Use parameterized queries to ensure that user inputs are treated as
data, not executable code.
2. Input Validation: Sanitize and validate all user inputs to remove harmful characters or
commands.
3. Stored Procedures: Encapsulate SQL queries within stored procedures to limit direct
interaction with the database.
4. Web Application Firewalls (WAFs): Implement WAFs to filter and monitor traffic for
SQL injection patterns.
5. Regular Security Audits: Conduct frequent audits and code reviews to identify and
address potential vulnerabilities.
B. What is steganography? Explain types of steganography. (10)
Steganography is the practice of hiding secret data within other non-secret data to avoid
detection. It differs from cryptography, which obscures the content of the message but does not
hide its existence.
Types of Steganography:
1. Image Steganography: Hiding data within image files by altering the pixel values. The
Least Significant Bit (LSB) method is commonly used.
4. Text Steganography: Hiding messages within text files by using specific formatting,
spacing, or manipulating the arrangement of words.
Steganography is used for secure communications, copyright protection, and covert data transfer.
Q5.
A. What is Social Engineering? Explain types of Social Engineering. (10)
Social Engineering is a manipulation technique that exploits human psychology to gain
confidential information or access to systems. It relies on deception to trick individuals into
divulging sensitive data or performing actions that compromise security.
Types of Social Engineering:
3. Pretexting: The attacker creates a fabricated scenario to obtain personal information. For
example, pretending to be an IT support technician.
4. Baiting: Offering something enticing (like free software) to lure victims into revealing
sensitive information or downloading malware.
1. DDoS Attacks: Flooding a target with traffic, overwhelming servers and causing
downtime.
2. Spamming: Sending unsolicited emails en masse using the resources of the infected
machines.
3. Credential Theft: Collecting login information or personal data from infected machines.
4. Mining Cryptocurrencies: Utilizing the processing power of botnet devices to mine
cryptocurrency without the owners’ consent.
Botnets can consist of thousands of infected devices, making them powerful tools for
cybercriminals. Preventive measures include keeping software updated, using strong passwords,
and employing security solutions to detect and remove malware.
Q6.
A. Explain DNS Poisoning & ARP Poisoning in detail. (10)
DNS Poisoning (or DNS Spoofing) is a cyber attack that compromises the integrity of a DNS
server, redirecting users from legitimate websites to malicious ones. This is done by injecting
false DNS responses into the cache of the server.
How it Works:
1. An attacker sends a forged DNS response to the target DNS server, associating a
legitimate domain with a malicious IP address.
2. Users attempting to access the legitimate site are redirected to the attacker's site, where
they may be phished or infected with malware.
ARP Poisoning (or ARP Spoofing) is an attack on a local area network that exploits the Address
Resolution Protocol (ARP). The attacker sends falsified ARP messages to associate their MAC
address with the IP address of another device (often the default gateway).
How it Works:
1. The attacker sends ARP responses that associate their MAC address with the IP address
of a legitimate device on the network.
2. Other devices on the network then send traffic intended for the legitimate device to the
attacker's device, allowing them to intercept, modify, or block the communication.
Countermeasures for Both Attacks:
• Use of DNSSEC: Implementing DNS Security Extensions to protect against DNS spoofing.
• Static ARP Entries: Configuring static ARP entries to prevent ARP spoofing.
• Packet Filtering: Using firewalls and intrusion detection systems to monitor and block
suspicious traffic.
B. What is Proxy Server? Explain types of Proxy server in detail. (10)
A Proxy Server acts as an intermediary between a client and a destination server. It forwards
requests from clients to the internet and returns responses, providing anonymity, security, and
content filtering.
Types of Proxy Servers:
1. Forward Proxy: Sits between a client and the internet, forwarding client requests. It can
provide anonymity and content filtering.
o Example: A school using a forward proxy to restrict access to certain websites for
students.
2. Reverse Proxy: Sits in front of web servers and forwards client requests to them. It can
provide load balancing, SSL termination, and caching.
o Example: A reverse proxy used by a large website to distribute traffic among
multiple servers.
3. Transparent Proxy: Intercepts client requests without modifying them and without
requiring any configuration on the client side. Often used for caching and filtering.
o Example: An ISP using a transparent proxy to cache frequently accessed web
content to reduce bandwidth.
4. Anonymous Proxy: Hides the user's IP address from the destination server, providing
anonymity but still revealing that a proxy is being used.
o Example: A user accessing the internet through an anonymous proxy to hide their
identity.
5. High Anonymity Proxy: Completely hides the user's IP address and does not disclose
that it is a proxy server, providing the highest level of anonymity.
o Example: An individual using a high anonymity proxy to securely browse the
internet without being tracked.
Q1. Write Short notes on the following:
a. Cross Site Scripting (XSS)
Cross-Site Scripting (XSS) is a web security vulnerability that allows attackers to inject
malicious scripts into web pages viewed by users. This occurs when a web application includes
untrusted data in a new webpage without proper validation or escaping. There are three main
types of XSS:
1. Stored XSS: The malicious script is stored on the server (e.g., in a database) and is
delivered to users when they access the affected page.
2. Reflected XSS: The script is reflected off a web server, usually via a URL, and executed
immediately without being stored.
3. DOM-based XSS: The vulnerability exists in the client-side code rather than the server,
and the script is executed as a result of modifying the DOM environment.
Impact: XSS can lead to session hijacking, defacement, and the spread of malware.
b. SQL Injection
SQL Injection is a code injection technique that exploits vulnerabilities in an application's
software by injecting malicious SQL queries. Attackers can manipulate SQL statements to
execute arbitrary queries, potentially gaining unauthorized access to data.
Example: Consider a login form where an attacker inputs:
sql
Copy code
' OR '1'='1'; --
1. Introduction of New Offenses: It includes provisions for identity theft, cyber terrorism,
and data theft.
5. Awareness and Training: Repeated testing can help train staff and increase awareness of
security practices.
Conducting regular penetration tests allows organizations to proactively manage risks and
maintain robust security.
e. Footprinting
Footprinting is the process of gathering information about a target system or organization to
identify potential vulnerabilities. It is often the first step in an attack and can be divided into two
main types:
1. Active Footprinting: Involves direct interaction with the target system, such as pinging
or port scanning, to gather information about network services and devices.
1. Cookie Theft: Capturing session cookies through methods like XSS or sniffing
unsecured traffic.
2. Session Fixation: Forcing a user to authenticate with a specific session ID known to the
attacker.
Q2.
a. What are Different types of hackers? Explain any three types of Hackers in Detail. (10)
Hackers can be classified into several categories based on their intent and activities. Here are
three main types:
1. White Hat Hackers: Also known as ethical hackers, they are security professionals who
use their skills to help organizations improve their security. They conduct penetration
testing, vulnerability assessments, and security audits to identify and mitigate risks.
White hat hackers operate with permission and within legal boundaries.
2. Black Hat Hackers: These are malicious hackers who exploit vulnerabilities for personal
gain, such as stealing data, spreading malware, or conducting fraud. They engage in
illegal activities and are often associated with cybercrime. Black hat hackers do not seek
permission and disregard the law.
3. Gray Hat Hackers: Gray hats fall somewhere between white and black hats. They may
exploit vulnerabilities without malicious intent but do so without permission. For
example, they might identify a security flaw in a system and inform the organization but
might also disclose the vulnerability publicly if not addressed.
Understanding these types helps organizations build effective cybersecurity strategies and
differentiate between ethical and malicious activities.
b. What are the different types of password attacks? Explain techniques to crack
passwords. (10)
Password Attacks are methods used by attackers to gain unauthorized access to systems by
cracking user passwords. Common types include:
2. Dictionary Attack: This method involves using a pre-defined list of common passwords
or phrases (a dictionary) to guess the password. It is faster than brute force as it targets
likely candidates.
3. Credential Stuffing: Attackers use stolen username and password combinations from
one breach to gain access to accounts on other platforms, exploiting the tendency of users
to reuse passwords.
Q3.
a. What is session hijacking, Define session hijacking techniques? (10)
Session Hijacking refers to the exploitation of a valid session to gain unauthorized access to
information or services. Attackers aim to take over a user's session by obtaining session tokens
or cookies.
Techniques of Session Hijacking:
1. Cookie Theft: Attackers capture session cookies through XSS attacks or network
sniffing. Once obtained, they can impersonate the user.
2. Session Fixation: An attacker tricks a user into authenticating with a session ID known
to the attacker, allowing them to take over the session once the user logs in.
4. Cross-Site Request Forgery (CSRF): An attacker tricks a user into executing unwanted
actions on a different website where the user is authenticated, potentially compromising
the session.
Prevention Measures: Utilize secure cookies, implement session timeouts, employ multi-factor
authentication, and ensure HTTPS encryption.
b. What are the applications of steganography? Explain types of steganography. (10)
Steganography is the practice of hiding secret messages within non-secret mediums to avoid
detection. It has several applications, including:
4. Data Integrity: Ensuring that data has not been altered by embedding checksums within
files.
Types of Steganography:
2. Audio Steganography: Concealing information in audio files, often by altering the least
significant bits of audio samples.
3. Video Steganography: Embedding data within video files, typically through frame
manipulation or compression techniques.
4. Text Steganography: Hiding messages within text files by manipulating formatting,
spacing, or using specific word patterns.
Steganography provides a means of secure communication, ensuring that messages remain
hidden from prying eyes.
Q4.
a. What are different types of Trojans? Explain each in brief. (10)
Trojans are malicious programs that disguise themselves as legitimate software to deceive users.
Different types include:
1. Remote Access Trojans (RATs): Allow attackers to remotely control the infected
system, accessing files, recording keystrokes, and using the camera/microphone.
3. Downloader Trojans: Used to download additional malicious software onto the infected
system, often serving as a gateway for further attacks.
4. Rootkit Trojans: Hide their presence on the infected system and provide unauthorized
access to the attacker while making it difficult for users to detect.
5. Trojan-Spy: Designed to gather sensitive information from the infected system, such as
passwords and personal data, and send it back to the attacker.
6. Exploit Trojans: Take advantage of software vulnerabilities to infect the system and
execute malicious actions.
Understanding these types helps in implementing appropriate security measures against Trojan
threats.
b. How does a penetration test differ from other types of ethical hacking assessments? (10)
Penetration Testing and other types of ethical hacking assessments differ primarily in scope and
methodology:
3. Red Team Assessments: Involves a team of ethical hackers (red team) simulating an
adversary's tactics, techniques, and procedures to test an organization's defenses
comprehensively. This approach emphasizes real-world attack scenarios and often
includes social engineering and physical security testing.
4. Blue Team Assessments: Focused on defensive strategies, the blue team monitors and
responds to threats. They evaluate incident response effectiveness and overall security
posture, working to improve defense mechanisms.
Overall, penetration testing is a specific, focused type of ethical hacking aimed at identifying and
demonstrating vulnerabilities through exploitation.
Q5.
a. Describe the differences between a DoS and a DDoS attack, and explain how to conduct a
controlled DoS or DDoS attack. (10)
Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks are both aimed at
making a service unavailable, but they differ in execution:
1. DoS Attack: Conducted by a single attacker, it aims to overwhelm a target system with
traffic or requests, exhausting resources and rendering the service unavailable. Common
methods include flooding the target with requests or exploiting vulnerabilities.
2. DDoS Attack: Involves multiple compromised systems (often part of a botnet) targeting
a single system simultaneously. This amplifies the volume of traffic and makes it more
challenging to mitigate. DDoS attacks often use amplification techniques to increase the
traffic sent to the target.
Conducting a Controlled DoS or DDoS Attack: This should only be performed in a legal and
ethical manner, typically as part of a penetration test with explicit permission from the target
organization. The steps involve:
1. Planning: Define the scope, objectives, and permissible limits of the test.
2. Selecting Tools: Use controlled tools such as LOIC (Low Orbit Ion Cannon) for
bandwidth flooding or stress testing.
3. Monitoring Impact: Measure how the target system responds and identify points of
failure.
2. Infrastructure Networks: These use a central access point (AP) to connect wireless
devices to a wired network. This is the most common type used in homes and businesses.
3. Mesh Networks: A decentralized network structure where each device can connect
directly to multiple other devices, enhancing coverage and redundancy.
Wireless Encryption Techniques:
2. Wi-Fi Protected Access (WPA): Developed to address the vulnerabilities of WEP, WPA
uses a stronger encryption protocol (TKIP) and includes improvements in key
management and message integrity checks. WPA2 further enhanced security by using
AES encryption.
3. WPA3: The latest standard, providing improved security features such as enhanced
encryption for open networks and better protection against brute-force attacks.
Using stronger encryption protocols is crucial for securing wireless networks against
unauthorized access and data breaches.
Q6.
a. What information can be enumerated by intruders? Explain the different enumeration
techniques. (10)
Information Enumeration involves gathering detailed information about a target system or
network to identify vulnerabilities. Commonly enumerated data includes:
1. Usernames and Groups: Lists of user accounts and their associated groups.
2. Network Resources: Information about shared files, printers, and services on the
network.
4. Running Services: Active services and their configurations that can be exploited.
Enumeration Techniques: