Ethical Hacking SET 1 Answer Key
Ethical Hacking SET 1 Answer Key
Part A (5 X 2 = 10 Marks)
o Importance: Used to gain unauthorized access, steal data, disrupt operations, and can
be part of larger cyberattacks like ransomware or spyware.
o Main Components: Transmission Control Protocol (TCP) and User Datagram Protocol
(UDP).
o Definition: The process of identifying active hosts, IP addresses, open ports, and services
within a network.
o Purpose: To assess network vulnerabilities, identify potential targets, and prepare for
further analysis or attacks.
o Importance: Helps attackers find subdomains, email servers, and zone transfers,
providing insight into a network's infrastructure.
Part B (2 X 16 = 32 Marks)
o India:
o Challenges:
OR
7. Illustrate how network and computer attacks are performed with relevant examples.
o Network Attacks:
o Computer Attacks:
Phishing: Social engineering tactic where attackers trick users into revealing
sensitive information; example: Credential harvesting through fake login pages.
Example Tools: Nmap for scanning, Metasploit for exploiting vulnerabilities, and
Wireshark for packet analysis.
o Psychological Manipulation:
o Impact on Footprinting:
o Preventive Measures:
9. Explore the different scanning techniques that can bypass IDS and Firewalls.
FIN, NULL, and XMAS Scans: Exploit TCP protocol characteristics to evade
detection.
o Advanced Techniques:
Decoy Scanning: Uses multiple IP addresses to hide the true source of scanning.
o Firewall Evasion:
Spoofed Source IPs: Makes it difficult for firewalls to filter out malicious traffic.
o Tools:
Hping: Custom packet crafting for advanced scanning and testing firewall rules.
o SNMP Basics:
o Impact:
Network Mapping: SNMP data helps attackers create a detailed map of network
devices.
Data Exfiltration and Network Control: Can lead to unauthorized control over
network resources.
o Preventive Measures:
Limit SNMP Access: Restrict SNMP to essential devices and trusted IP addresses.
o Tools Used:
SolarWinds, Nmap, and SNMPwalk: These tools help exploit SNMP for
enumeration.
OR
11. Investigate the methods of LDAP and DNS enumeration and their consequences on network
security.
o LDAP Enumeration:
LDAP Basics: Directory access protocol used for storing and retrieving
information, often user-related.
Attack Techniques: Query for user accounts, system roles, and network structure
using LDAP queries.
o DNS Enumeration:
Exposure of Sensitive Information: LDAP and DNS data can help attackers target
specific systems.
o Mitigation Strategies:
Limit Zone Transfers in DNS: Configure DNS servers to allow zone transfers only
to trusted servers.
o Tools:
Nslookup, Dig (for DNS) and LDAPsearch: Common tools for LDAP and DNS
enumeration.