ESE Question Bank Short Notes
ESE Question Bank Short Notes
Cyber Security
Preventing CyberAttack
Removing virus
Business Continuity
Ransomeware
Blockchain
IOT
AI
Serverless Functions
Malware
Emotet
MITM
Phishing
DOS
SQL Injection
Password Attacks
4. CIA Triad
Confidentiality
Integral
Availability
5. Cyberspace
TSTWA
Targeted Identification
Database Comparison
Risk Prioritisation
Ongoing Maintenance
Banner is a text showed by the host which displays information about the type and the version and
other information about the software running on the system
purpose
identify
vulnerability
compatibility
ways
banner grabbing
Tools: Nmap, Web Scanner: Nikto and Burp, Specialised tools: Netcat, BannerGrab, Telnet
9. What is OpenVas?
Overview :
Open Vulnerability Assessment System (OpenVAS) is free software that provides various services and
tools for vulnerability assessment
Clients –
Open VAS CLI and Green-bone Security Assistant (GSA) are interfaces available for clients.|
Services –
Open VAS Scanner and Open VAS Manager are services that actually perform the tasks of scanning
the host machine on the network for Network Vulnerability Tests (NVTs).
Data –
NVTs results and configs are data used in the process of scanning the host machine.
11. DataPipe, FPipe
DataPipe – unix based, only for tcp ports, it is not an endpoint and it is more llike a channel, takes
you from one port to another , it is protocal ignorant, works all protocals, also takes care if it is plaion
text or SSH encrypted
FPipe - windows based, both tcp and udp ports , and it does not need dlls and can the file can be
shared dynamically, it has more support and features increasing its capability , provided by McAfee
It is used to monitor the flow of the data packets flowing in to the network
Functionality: They intercept packets and read them to know if they are malicious or not and also
control traffic.
Use Cases: Network troubleshooting and traffic analysis, detect unauthorised traffic
Purpose: sniffing packets and analyzing them, inspect all the shit and also filter traffic
Features: wide range of options and filters for specifying packet capture criteria, such as
source/destination IP addresses, ports, protocols
Features: same
Usage: same
14. Ettercap
sniffing, network analysis, and man-in-the-middle (MITM) attacks and HACKING as well
Core features
ARP Spoofing
Packet sniffing
MITM
SSL Stripping
Password
Plugin Data
Protocol support :
15. Snort
16. Firewall