Explain what is Ethical Hacking?

Ethical Hacking is when a person is allowed to hacks the system with the permission of the product owner to find weakness in a system and later fix them.

What is footprinting ?

Definition and types of scanning

Scanning refers to a set of procedures for identifying hosts, ports, and services in a network. Scanning is one of the components of intelligence gathering for an attacker to create a profile of the target organization. Scanning types :
Port Scanning
Vulnerability Scanning
Network Scanning

What is Enumeration ?

Enumeration is defined as the process of extracting user names, machine names, network resources, shares, and services from a system. Enumeration techniques are conducted in an Intranet Environment.

What is SNMP( Simple Network Management Protocol ) ?

Simple Network Management Protocol ( SNMP ) is a TCP/IP protocol used for remote monitoring and managing hosts, routers, and other devices on a network.

What is MIB ( Management Information Base )?

MIB is a virtual database containing formal description of all the network objects that can be managed using SNMP. The MIB database is hierarchical and each managed object in a MIB is addressed through object identifiers ( OID )

What is LDAP ( Lightweight Directory Access Protocol ) ?

The Lightweight Directory Access protocol is a protocol used to access the directory listings within Active Directory or from the other directory services.

What is NTP ?

Network Time Protocol ( NTP ) is designed to synchronize clocks of networked computers. It uses UDP port 123 as its primary means of communication. NTP can maintain time to within 10 milliseconds (1/100 seconds) over the public Internet.

What are the types of hacking stages ?

Gaining Access
Escalating Privileges
Executing Applications
Hiding Files
Covering Tracks

Types of password cracking techniques?

Dictionary Attacks
Brute Forcing Attacks
Hybrid Attack
Syllable Attack
Rule – based Attack.

Explain what is ARP Spoofing or ARP poisoning?

ARP (Address Resolution Protocol) is a form of attack in which an attacker changes MAC ( Media Access Control) address and attacks an internet LAN by changing the target computer’s ARP cache with a forged ARP request and reply packets.

RECOMMENDED COURSES OFFERED BY CRAW SECURITY

Contact Us

+91-9650202445 | +91-9650677445

[email protected]