What are worms?

October 5, 2008 0 Comments 0 tags

Worms are programs that replicate themselves from one system to another without using a host file. Although in most cases worms exist inside files, such as Word or Excel documents,

What are whois queries?

October 4, 2008 0 Comments 0 tags

Whois queries are used to determine the IP address ranges associated with clients. A whois query can be run on most UNIX environments. In a Windows environment, the tools such

What are the various Trojan vectors?

October 3, 2008 0 Comments 0 tags

A Trojan may infect any system through Trojan vectors. The most common Trojan vectors are as follows: * Email attachments * Social engineering * NetBIOS remote installation * Physical access

What are the various steps in the pre-attack phase?

October 2, 2008 0 Comments 0 tags

In the pre-attack phase, there are seven steps, which have been defined by the EC-Council, as follows: 1. Information gathering 2. Determining network range 3. Identifying active machines 4. Finding

What are the various modes of system security testing?

October 1, 2008 0 Comments 0 tags

The various modes of system security testing are as follows: 1. Remote network: This mode attempts to simulate an attack launched over the Internet. The primary defenses that must be

What are the various methods of passive OS fingerprinting?

September 28, 2008 0 Comments 0 tags

In passive OS fingerprinting, an attacker installs a sniffer on any third party such as a router on which the victim communicates frequently. Now he studies the sniffer’s log and

What are the various countermeasures to a buffer overflow?

September 27, 2008 0 Comments 0 tags

The countermeasures to a buffer overflow are as follows: * Perform manual auditing of the code. * Stack execution should be disabled. * Take the support of the functions which