Explain what is Ethical Hacking?
Ethical Hacking is when a person is allowed to hacks the system with the permission of the product owner to find weakness in a system and later fix them.
What is footprinting ?
Footprinting refers to uncovering and collecting as much information as possible about a target network.
Definition and types of scanning
Scanning refers to a set of procedures for identifying hosts, ports, and services in a network. Scanning is one of the components of intelligence gathering for an attacker to create a profile of the target organization. Scanning types :
What is Enumeration ?
Enumeration is defined as the process of extracting user names, machine names, network resources, shares, and services from a system. Enumeration techniques are conducted in an Intranet Environment.
What is SNMP( Simple Network Management Protocol ) ?
Simple Network Management Protocol ( SNMP ) is a TCP/IP protocol used for remote monitoring and managing hosts, routers, and other devices on a network.
What is MIB ( Management Information Base )?
MIB is a virtual database containing formal description of all the network objects that can be managed using SNMP. The MIB database is hierarchical and each managed object in a MIB is addressed through object identifiers ( OID )
What is LDAP ( Lightweight Directory Access Protocol ) ?
The Lightweight Directory Access protocol is a protocol used to access the directory listings within Active Directory or from the other directory services.
What is NTP ?
Network Time Protocol ( NTP ) is designed to synchronize clocks of networked computers. It uses UDP port 123 as its primary means of communication. NTP can maintain time to within 10 milliseconds (1/100 seconds) over the public Internet.
What are the types of hacking stages ?
Types of password cracking techniques?
Brute Forcing Attacks
Rule – based Attack.
Explain what is ARP Spoofing or ARP poisoning?
ARP (Address Resolution Protocol) is a form of attack in which an attacker changes MAC ( Media Access Control) address and attacks an internet LAN by changing the target computer’s ARP cache with a forged ARP request and reply packets.