What are the various methods of passive OS fingerprinting?

September 28, 2008 0 Comments 0 tags

In passive OS fingerprinting, an attacker installs a sniffer on any third party such as a router on which the victim communicates frequently. Now he studies the sniffer’s log and

What are the various countermeasures to a buffer overflow?

September 27, 2008 0 Comments 0 tags

The countermeasures to a buffer overflow are as follows: * Perform manual auditing of the code. * Stack execution should be disabled. * Take the support of the functions which

What are the various features of snort?

September 26, 2008 0 Comments 0 tags

Snort has the following features: * It detects threats, such as buffer overflows, stealth port scans, CGI attacks, SMB probes and NetBIOS queries, NMAP and other port scanners, well-known backdoors

What are the user authentications supported by the SSH-2 protocol?

September 25, 2008 0 Comments 0 tags

The SSH-2 protocol supports the following user authentications: * Public key authentication (DSA, RSA*, OpenPGP) * Host-based authentication * Password-based authentication Note: SSH-1 supports a wider range of user authentications,

What are the steps for security evaluation?

September 24, 2008 0 Comments 0 tags

The ethical hacking project comprises three phases, summarized as follows: 1. Preparation: In this phase, a formal contract that contains a non-disclosure clause as well as a legal clause to

What are the security holes in the Basic Authentication scheme?

September 22, 2008 0 Comments 0 tags

The Basic Authentication scheme uses the username and password and encrypts the password using base64 encoding. In spite of this, there are still many security holes in the Basic Authentication

What are the phases of malicious hacking?

September 20, 2008 0 Comments 0 tags

The following are the phases of malicious hacking: 1. Reconnaissance: In this phase, the attacker gathers information about the victim. 2. Scanning: In this phase, the attacker begins to probe