Wednesday, 23 September 2015

Experienced Ethical Hacking Interview Questions and Answers

16) Explain what is ARP Spoofing or ARP poisoning?
ARP (Address Resolution Protocol) is a form of attack in which an attacker changes MAC ( Media Access Control) address and attacks an internet LAN by changing the target computer’s ARP cache with a forged ARP request and reply packets.

17) How do I break out of a restricted shell?
On poorly implemented restricted shells you can break out of the restricted environment by running a program that features a shell function. A good example is vi. Run vi and use this command:
:set shell=/bin/sh
then shell using this command:

18) How you can avoid or prevent ARP poisoning?
ARP poisoning can be prevented by following methods
    Packet Filtering : Packet filters are capable for filtering out and blocking packets with conflicting source address information
    Avoid trust relationship : Organization should develop protocol that rely on trust relationship as little as possible
    Use ARP spoofing detection software : There are programs that inspects and certifies data before it is transmitted and blocks data that is spoofed
    Use cryptographic network protocols : By using secure communications protocols like TLS, SSH, HTTP secure prevents ARP spoofing attack by encrypting data prior to transmission and authenticating data when it is received

19) What is a hacking loop?
A loop is two phone numbers connected together by the phone company for testing purposes. A loop has a high end and a low end. If you dial the high end, you will hear nothing. Not even a ring. If you dial the low end, you will hear an annoying 1,000hz tone for several seconds. If you connect to the high end and someone dials the low
end, you can speak to each other.

20) What is Brute Force Hack?
Brute force hack is a technique for hacking password and get access to system and network resources, it takes much time, it needs a hacker to learn about JavaScripts. For this purpose, one can use tool name "Hydra".

More Questions & Answers:-
Page1 Page2 Page3 Page4 Page5 Page6 Page7

No comments:

Post a Comment