What are the various steps in the pre-attack phase?

October 2, 2008 0 Comments 0 tags

In the pre-attack phase, there are seven steps, which have been defined by the EC-Council, as follows: 1. Information gathering 2. Determining network range 3. Identifying active machines 4. Finding

What are the various modes of system security testing?

October 1, 2008 0 Comments 0 tags

The various modes of system security testing are as follows: 1. Remote network: This mode attempts to simulate an attack launched over the Internet. The primary defenses that must be

What are the various methods of passive OS fingerprinting?

September 28, 2008 0 Comments 0 tags

In passive OS fingerprinting, an attacker installs a sniffer on any third party such as a router on which the victim communicates frequently. Now he studies the sniffer’s log and

What are the various countermeasures to a buffer overflow?

September 27, 2008 0 Comments 0 tags

The countermeasures to a buffer overflow are as follows: * Perform manual auditing of the code. * Stack execution should be disabled. * Take the support of the functions which

What are the various features of snort?

September 26, 2008 0 Comments 0 tags

Snort has the following features: * It detects threats, such as buffer overflows, stealth port scans, CGI attacks, SMB probes and NetBIOS queries, NMAP and other port scanners, well-known backdoors

What are the user authentications supported by the SSH-2 protocol?

September 25, 2008 0 Comments 0 tags

The SSH-2 protocol supports the following user authentications: * Public key authentication (DSA, RSA*, OpenPGP) * Host-based authentication * Password-based authentication Note: SSH-1 supports a wider range of user authentications,

What are the steps for security evaluation?

September 24, 2008 0 Comments 0 tags

The ethical hacking project comprises three phases, summarized as follows: 1. Preparation: In this phase, a formal contract that contains a non-disclosure clause as well as a legal clause to