๐๐Test 2021 IMK PAID CLASS๐๐
โค๏ธโ๐ฅ Yesterday Test Answers By
@Mr_Robleisโค๏ธโ๐ฅ 1.) What is the difference between IP address and Mac address?
> Difference between MAC and IP address is that MAC Address is used to ensure the physical address of the computer. It uniquely identifies the devices on a network. While IP addresses are used to uniquely identifies the connection of the network with that device takes part in a network.
โค๏ธโ๐ฅ 2.) List out some of the common tools used by Ethical hackers?
> Nmap Hacking Tool
Burp Suite Hacking Tool
Netsparker
Acunetix
Metasploit
Aircrack-Ng
Ettercap
John The Ripper
Wireshark
Angry IP Scanner
โค๏ธโ๐ฅ 3.)What is footprinting in ethical hacking? What is the techniques used for footprinting?
> It Refers to the process of collecting as much as information as possible about the target system to find ways to penetrate into the system. Techniques : DNS Queries, N/W Enumeration, Network Queries, Ping Sweeps, Port Scanning.
โค๏ธโ๐ฅ 4.)Explain what is DOS (Denial of service) attack? What are the common forms of DOS attack?
> A denial-of-service (DoS) attack aims to obstruct a network or resource by flooding a target with artificial traffic, which restricts user access to the respective service being attacked. Types : Ddos, N/W Targeted Attacks, System Targeted, Teardrop.
โค๏ธโ๐ฅ 5.) Explain what is SQL injection?
> SQL Injection attacks (or SQLi) alter SQL queries, injecting malicious code by exploiting application vulnerabilities.
โค๏ธโ๐ฅ 6.) Explain what is Network Sniffing?
> Sniffing is a process of monitoring and capturing all data packets passing through given network. Sniffers are used by network/system administrator to monitor and troubleshoot network traffic. Attackers use sniffers to capture data packets containing sensitive information such as password, account information etc.
โค๏ธโ๐ฅ 7.) Write Linux command to view text file?
> cat foo.txt or cat /etc/resolv.conf
โค๏ธโ๐ฅ 8.)Explain what is Burp Suite, what are the tools it consist of?
> Burp Suite is an integrated platform for performing security testing of web applications. Tools : Target, proxy, repeater, scanner, Intruder, sequencer, decoder, comparer etc.
โค๏ธโ๐ฅ 9.)You are working as an ethical hacker in a company you have to hide your company data, what the methods you will use explain in your own language.
> When a cyberattack occurs, ethical hackers are called in to be digital detectives. In a certain sense, they are like regular police detectives on TV. They have to search computer systems to find ways an intruder might have come in โ a digital door or window left unlocked, perhaps.
โค๏ธโ๐ฅ 10.) Find location and open ports of this ip address 49.33.178.116
> City : Mumbai
Region : Maharashtra (MH)
Postal code : 400070
Country : India (IN)
Continent : Asia (AS)
Coordinates : 19.0748 (lat) / 72.8856 (long)
Starting Nmap 7.40 (
https://nmap.org ) at 2021-10-22 16:14 UTC
Nmap scan report for 49.33.178.116
Host is up.
PORT STATE SERVICE
21/tcp filtered ftp
22/tcp filtered ssh
23/tcp filtered telnet
80/tcp filtered http
110/tcp filtered pop3
143/tcp filtered imap
443/tcp filtered https
3389/tcp filtered ms-wbt-server
Nmap done: 1 IP address (1 host up) scanned in 3.15 seconds
โค๏ธโ๐ฅRegards>
@CIDHUB**