Video oldindan ko‘rish uchun mavjud emas
Telegram'da ko‘rish
CIDHUB 2021 NOV CTF SOLUTION
Answers of https://t.me/IndianCyberIntelligence/32781
🗺️1=Which command is use Metasploit to get option details of exploit? >> show options
🗺️2=Which protocol should you use to filter all web traffic?
>> https
🗺️3=What is the primary difference between threat hunting and penetration testing?
>> threat hunting: Tells us that who is already in our enviornmentand deals with the present state. penetration testing: Tells us that how anyone can get into our enviornment and how different vulnerabilities may be exploited
🗺️4=Which programming language can be used to write Metasploit scripts for Metasploit 4.x Framework?
>> Ruby
🗺️5=Which command sets the SHELLCODE?
>> set PAYLOAD payloadname
🗺️6=What is the default command port for FTP?
>> Port 21
🗺️7=Which hash algorithm produces a 160-bit value?
>> SHA-1
🗺️8=What are the two types of intrusion detection systems?
>> NIDS & HIDS
🗺️9= Do Yourself
🗺️10= Use Virustotal.com
❤️🔥Regards=@CIDHUB
Answers of https://t.me/IndianCyberIntelligence/32781
🗺️1=Which command is use Metasploit to get option details of exploit? >> show options
🗺️2=Which protocol should you use to filter all web traffic?
>> https
🗺️3=What is the primary difference between threat hunting and penetration testing?
>> threat hunting: Tells us that who is already in our enviornmentand deals with the present state. penetration testing: Tells us that how anyone can get into our enviornment and how different vulnerabilities may be exploited
🗺️4=Which programming language can be used to write Metasploit scripts for Metasploit 4.x Framework?
>> Ruby
🗺️5=Which command sets the SHELLCODE?
>> set PAYLOAD payloadname
🗺️6=What is the default command port for FTP?
>> Port 21
🗺️7=Which hash algorithm produces a 160-bit value?
>> SHA-1
🗺️8=What are the two types of intrusion detection systems?
>> NIDS & HIDS
🗺️9= Do Yourself
🗺️10= Use Virustotal.com
❤️🔥Regards=@CIDHUB