1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Ethical Hacking Basics Class part 1

Discussion in 'Ethical hacking Tips' started by XXxxImmortalxxXX, Jul 7, 2008.

  1. naimish

    naimish New Member

    Joined:
    Jun 29, 2009
    Messages:
    1,046
    Likes Received:
    18
    Trophy Points:
    0
    Occupation:
    Software Engineer
    Location:
    On Earth
  2. !Newbie!

    !Newbie! New Member

    Joined:
    Apr 13, 2009
    Messages:
    131
    Likes Received:
    4
    Trophy Points:
    0
    Location:
    Around
    No, pen testing is penetration testing...
    USB hacking is hacking done through portable devices...
     
  3. naimish

    naimish New Member

    Joined:
    Jun 29, 2009
    Messages:
    1,046
    Likes Received:
    18
    Trophy Points:
    0
    Occupation:
    Software Engineer
    Location:
    On Earth
    Yeah, I tried it, but it was only fun.....is there any extreme trick for it ?
     
  4. shabbir

    shabbir Administrator Staff Member

    Joined:
    Jul 12, 2004
    Messages:
    15,285
    Likes Received:
    364
    Trophy Points:
    83
    Corrected the link which should not have a - at the end.
     
  5. naimish

    naimish New Member

    Joined:
    Jun 29, 2009
    Messages:
    1,046
    Likes Received:
    18
    Trophy Points:
    0
    Occupation:
    Software Engineer
    Location:
    On Earth
    Thanks, now I got it :)
     
  6. !Newbie!

    !Newbie! New Member

    Joined:
    Apr 13, 2009
    Messages:
    131
    Likes Received:
    4
    Trophy Points:
    0
    Location:
    Around
    No extreme trick as such which am aware currently, will look out and let you know if I find any...
     
  7. Adbest

    Adbest New Member

    Joined:
    May 28, 2010
    Messages:
    3
    Likes Received:
    0
    Trophy Points:
    0
    Occupation:
    Student
    Location:
    Karachi
    yeah. i have watched a bit of the movie too. The hackers says his handle is rat ;)
     
  8. unni krishnan.r

    unni krishnan.r New Member

    Joined:
    Apr 20, 2010
    Messages:
    204
    Likes Received:
    3
    Trophy Points:
    0
    Occupation:
    education
    Location:
    Kerala
    Home Page:
    do anybody can Hack
     
  9. Tuhin Banerjee

    Tuhin Banerjee New Member

    Joined:
    Dec 12, 2010
    Messages:
    1
    Likes Received:
    0
    Trophy Points:
    0
    Hi, XXxxImmortalxxXX

    My answers are in bold, though it's an 1.5 years old thread, I have just posted my answers to get to know the correct one:

    Question 1:
    In 2000, Mafiaboy launched an attack that knocked out eBay and Yahoo! for several hours. This attack targeted which of the following?

    A:AvailabilityB:Integrity
    C:Confidentiality
    D:Authentication
    __________________________________________________ _________________________________________

    Question 2:
    How many components are in a security evaluation?

    A:Five
    B:Four
    C:Two
    D:Three__________________________________________________ _________________________________________

    Question 3:
    Hacker attacks, unauthorized access, and viruses and malware can all be described as what?

    A:Risk
    B:Threats
    C:Exploits
    D:Vulnerabilities
    __________________________________________________ _________________________________________

    Question 4:
    What is the main federal statute that addresses computer hacking under U.S. Federal Law? Choose one answer.

    A:Section 2701
    B:Section 1029
    C:Section 2510
    D:Section 1028
    __________________________________________________ _________________________________________

    Question 5
    Which of the following addresses the secrecy and privacy of information?

    A:Availability
    B:Authentication
    C:Integrity
    D: Confidentiality__________________________________________________ _________________________________________

    Question 6:
    This type of security test might seek to target the CEO?s laptop or the organization?s backup tapes to extract critical information, usernames, and passwords. Choose one answer.

    A:Physical entry
    B:Outsider attack
    C:Stolen equipment
    D:Insider attack __________________________________________________ _________________________________________

    Question 7:
    Which of the following best describes an attack that altered the contents of two critical files?

    A:Authentication
    B:Confidentiality
    C:Availability
    D:Integrity
    __________________________________________________ _________________________________________

    Question 8:
    Which of the following is the most important step for the ethical hacker to perform during the preassessment?

    A:Obtain permission to hack
    B:Hack the web server.
    C:Obtain written permission to hack.
    D:Gather information about the target.
    __________________________________________________ _________________________________________

    Question 9:
    This type of security test typically takes on an adversarial role and looks to see what an outsider can access and control.

    A:Policy assessment
    B:Penetration test
    C:Network evaluation
    D:High level evaluation
    __________________________________________________ _________________________________________

    Question 10:
    Which of the following is one primary difference between a malicious hacker and an ethical hacker?

    A:Ethical hackers use the same methods but strive to do no harm
    B:Malicious hackers are more advanced than ethical hackers because they can use any
    C:Malicious hackers use different tools and techniques than ethical hackers do
    D:Ethical hackers obtain permission before bringing down servers or stealing credit card__________________________________________________ _________________________________________

    Question 11:
    Who are the individuals who perform legal security tests while sometimes performing questionable activities?

    A:Crackers
    B:Ethical hackers
    C:Whitehat hackers
    D:Grayhat hackers __________________________________________________ _________________________________________

    Question 12:

    Which individuals believe that hacking and defacing websites can promote social change?

    A:Ethical hackers
    B:Blackhat hackers
    C:Hacktivists
    D:Grayhat hackers
     
  10. linux7802

    linux7802 New Member

    Joined:
    Sep 10, 2010
    Messages:
    2
    Likes Received:
    0
    Trophy Points:
    0
    Home Page:
    Hi,

    Thank you , its really its very useful.
     
  11. praveen1

    praveen1 New Member

    Joined:
    Jan 11, 2011
    Messages:
    5
    Likes Received:
    0
    Trophy Points:
    0
    I am just a n00b here and thanks its really gr8 tht ur helping us a lot and thanks 2 the admin as well.
     
  12. peeger1

    peeger1 New Member

    Joined:
    Jan 13, 2011
    Messages:
    5
    Likes Received:
    0
    Trophy Points:
    0
    Occupation:
    Computer Specialist
    Location:
    NJ
    I am new to all this. how much does ethical hacking tyically cost if you were to contract someone....also how long would it take to complete?
     
  13. prathviraj

    prathviraj New Member

    Joined:
    Mar 17, 2011
    Messages:
    1
    Likes Received:
    0
    Trophy Points:
    0
    Occupation:
    Student
    Location:
    Mangalore
    Thanks a lot...
     
  14. Cleptography

    Cleptography New Member

    Joined:
    Sep 2, 2010
    Messages:
    39
    Likes Received:
    7
    Trophy Points:
    0
    Great article, very well constructed.
    Cheers-
     
  15. brokencard

    brokencard New Member

    Joined:
    Apr 22, 2011
    Messages:
    1
    Likes Received:
    0
    Trophy Points:
    0
    thanks for the class man :)
     
  16. Jitterbud

    Jitterbud New Member

    Joined:
    Jan 18, 2012
    Messages:
    1
    Likes Received:
    0
    Trophy Points:
    0
    Question 1:
    In 2000, Mafiaboy launched an attack that knocked out eBay and Yahoo! for several hours. This attack targeted which of the following?

    A:Availability

    __________________________________________________


    Question 2:
    How many components are in a security evaluation?


    D:Three(Stuck on this one, possible to inform me also which ones the components in a security evauluation are please. Many thanks.)
    __________________________________________________


    Question 3:
    Hacker attacks, unauthorized access, and viruses and malware can all be described as what?


    B:Threats

    __________________________________________________


    Question 4:
    What is the main federal statute that addresses computer hacking under U.S. Federal Law? Choose one answer.


    B:Section 1029

    __________________________________________________

    Question 5
    Which of the following addresses the secrecy and privacy of information?


    D: Confidentiality
    __________________________________________________


    Question 6:
    This type of security test might seek to target the CEO?s laptop or the organization's backup tapes to extract critical information, usernames, and passwords. Choose one answer.


    C:Stolen equipment

    __________________________________________________


    Question 7:
    Which of the following best describes an attack that altered the contents of two critical files?


    D:Integrity

    __________________________________________________


    Question 8:
    Which of the following is the most important step for the ethical hacker to perform during the preassessment?


    C:Obtain written permission to hack.

    __________________________________________________


    Question 9:
    This type of security test typically takes on an adversarial role and looks to see what an outsider can access and control.


    B:Penetration test

    __________________________________________________


    Question 10:
    Which of the following is one primary difference between a malicious hacker and an ethical hacker?

    D:Ethical hackers obtain permission before bringing down servers or stealing credit card
    __________________________________________________


    Question 11:
    Who are the individuals who perform legal security tests while sometimes performing questionable activities?


    D:Grayhat hackers
    __________________________________________________


    Question 12:

    Which individuals believe that hacking and defacing websites can promote social change?


    C:Hacktivists
     
  17. Digitalsec

    Digitalsec New Member

    Joined:
    May 28, 2010
    Messages:
    1
    Likes Received:
    0
    Trophy Points:
    0
    Thanks for sharing.
    Your Ethical Hacking basic class tutorials are nice.
    one of my friend studying Certified Ethical Cracker Course at infysec Chennai who referred your website, I like your website very much. :)
     
  18. blueyzblkdragon

    blueyzblkdragon Banned

    Joined:
    Apr 27, 2012
    Messages:
    2
    Likes Received:
    0
    Trophy Points:
    0
    thanks for all the info:D
     
  19. rapstarx

    rapstarx Banned

    Joined:
    May 1, 2012
    Messages:
    2
    Likes Received:
    0
    Trophy Points:
    0
    hey guys i wana learn hacking can anyone help me out. im really new in this sorts of things
     
  20. matrix4u

    matrix4u New Member

    Joined:
    Sep 3, 2011
    Messages:
    3
    Likes Received:
    0
    Trophy Points:
    0
    Wow, you are awesome! More grease to your elbow... Thumbs up for you
     

Share This Page