IT security – Ethical Hacking

1. A large company intends to use Blackberry for corporate mobile phones and a security analyst is assigned to evaluate the possible threats. The analyst will use the Blackjacking attack method to demonstrate how an attacker could circumvent perimeter defenses and gain access to the corporate network. What tool should the analyst use to perform a Blackjacking attack and Why?




2. The following is part of a log file taken from the machine on the network with the IP address of


Time:Mar 13 17:30:15 Port:20 Source: Destination: Protocol:TCP


Time:Mar 13 17:30:17 Port:21 Source: Destination: Protocol:TCP


Time:Mar 13 17:30:19 Port:22 Source: Destination: Protocol:TCP


Time:Mar 13 17:30:21 Port:23 Source: Destination: Protocol:TCP


Time:Mar 13 17:30:22 Port:25 Source: Destination: Protocol:TCP


Time:Mar 13 17:30:23 Port:80 Source: Destination: Protocol:TCP


Time:Mar 13 17:30:30 Port:443 Source: Destination: Protocol:TCP


What type of activity has been logged and Why?




3. A computer science student needs to fill some information into a secured Adobe PDF job application that was received from a prospective employer. Instead of requesting a new document that allowed the forms to be completed, the student decides to write a script that pulls passwords from a list of commonly used passwords to try against the secured PDF until the correct password is found or the list is exhausted.


Which cryptography attack is the student attempting and how would the student do it?




4. A security analyst in an insurance company is assigned to test a new web application that will be used by clients to help them choose and apply for an insurance plan. The analyst discovers that the application is developed in ASP scripting language and it uses MSSQL as a database backend. The analyst locates the application’s search form and introduces the following code in the search input field:


IMG SRC=vbscript:msgbox(“Vulnerable”);> originalAttribute=”SRC”




When the analyst submits the form, the browser returns a pop-up window that says “Vulnerable”. Which web applications vulnerability did the analyst discover and why?




5. You have compromised a server on a network and successfully opened a shell. You aimed to identify all operating systems running on the network. However, as you attempt to fingerprint all machines in the network using the nmap syntax below, it is not going through.


theprize@victim_server:~$ nmap -T4 -O


TCP/IP fingerprinting (for OS scan) xxxxxxx xxxxxx xxxxxxxxx.




What seems to be wrong and Why?


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s