201CS009
201CS009
Module-1
2. Any revealing of identification, appeal to evaluator and /or equations written eg, 42+8 = 50, will be treated as malpractice.
1 a. What is internet foot printing? Why does attacker need foot printing? What are their
objectives? (10 Marks)
b. What is enumeration? Explain the different services with their port numbers to enumerate.
(10 Marks)
OR
2 a. What is NETBIOS enumeration? Explain with a neat diagram. (10 Marks)
Important Note : 1. On completing your answers, compulsorily draw diagonal cross lines on the remaining blank pages.
Module-2
3 a. What are the different techniques to crack passwords? Explain. (10 Marks)
b. How does Microsoft authentication take place? Explain with an example. (10 Marks)
OR
4 a. Differentiate remote access versus local access. (10 Marks)
b. Explain: (i) Quest for root (ii) After hacking root (10 Marks)
Module-3
5 a. Explain the process involved in voice mail and VPN hacking. (10 Marks)
b. Explain with diagram the Brute Force Scripting PBX hacking. (10 Marks)
OR
6 a. What is Discovery Anonymous System look up? Explain with example. (10 Marks)
b. How do you detect network vulnerability and layer 2 media? (10 Marks)
Module-4
7 a. Explain the Wi-Fi authentication process using centralized authentication server. (10 Marks)
b. What is WEP encryption? How does it work? What are its advantages and disadvantages?
(10 Marks)
OR
8 Explain the following attacks on wireless network:
a. Ad-hoc Network Attack
b. Access Point MAC Spoofing
c. Generic DOS Attack
d. Honey Spot Access Point (20 Marks)
Module-5
9 a. Explain Remote Control Insecurities. (10 Marks)
b. Explain: (i) Microsoft Terminal Server (ii) Citrix ICA (10 Marks)
OR
10 Explain the following:
a. SSL fraud b. Email Hacking
c. IRC Hacking d. Web Server Hacking (20 Marks)
*****