Which of the following tools is used for port redirection?
Which of the following is a tool for SSH and SSL MITM attacks?
In which of the following attacks is a malicious packet rejected by an IDS, but accepted by the host system?
Which of the following tools can be used to automate the MITM attack?
LM hash is one of the password schemes that Microsoft LAN Manager and Microsoft Windows versions prior to the Windows Vista use to store user passwords that are less than 15 characters long. If you provide a password seven characters or less, the second half of the LM hash is always __________.
John, a novice web user, makes a new E-mail account and keeps his password as "apple", his favorite fruit. John's password is vulnerable to which of the following password cracking attacks?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following tasks is NOT performed into the enumeration phase?
Which of the following is a web ripping tool?
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully performed the following steps of the preattack phase to check the security of the We-are-secure network:
Gathering information
Determining the network range
Identifying active systems
Now, he wants to find the open ports and applications running on the network. Which of the following tools will he use to accomplish his task?
Which of the following tools can be used for session splicing attacks?