1. We have moved from vBulletin to XenForo and you are viewing the site in the middle of the move. Though the functional aspect of everything is working fine, we are still working on other changes including the new design on Xenforo.
    Dismiss Notice

Ethical Hacking Basics Class part 1

Discussion in 'Ethical hacking Tips' started by XXxxImmortalxxXX, Jul 7, 2008.

  1. naimish

    naimish New Member

  2. !Newbie!

    !Newbie! New Member

    No, pen testing is penetration testing...
    USB hacking is hacking done through portable devices...
     
  3. naimish

    naimish New Member

    Yeah, I tried it, but it was only fun.....is there any extreme trick for it ?
     
  4. shabbir

    shabbir Administrator Staff Member

    Corrected the link which should not have a - at the end.
     
  5. naimish

    naimish New Member

    Thanks, now I got it :)
     
  6. !Newbie!

    !Newbie! New Member

    No extreme trick as such which am aware currently, will look out and let you know if I find any...
     
  7. Adbest

    Adbest New Member

    yeah. i have watched a bit of the movie too. The hackers says his handle is rat ;)
     
  8. unni krishnan.r

    unni krishnan.r New Member

    do anybody can Hack
     
  9. Tuhin Banerjee

    Tuhin Banerjee New Member

    Hi, XXxxImmortalxxXX

    My answers are in bold, though it's an 1.5 years old thread, I have just posted my answers to get to know the correct one:

    Question 1:
    In 2000, Mafiaboy launched an attack that knocked out eBay and Yahoo! for several hours. This attack targeted which of the following?

    A:AvailabilityB:Integrity
    C:Confidentiality
    D:Authentication
    __________________________________________________ _________________________________________

    Question 2:
    How many components are in a security evaluation?

    A:Five
    B:Four
    C:Two
    D:Three__________________________________________________ _________________________________________

    Question 3:
    Hacker attacks, unauthorized access, and viruses and malware can all be described as what?

    A:Risk
    B:Threats
    C:Exploits
    D:Vulnerabilities
    __________________________________________________ _________________________________________

    Question 4:
    What is the main federal statute that addresses computer hacking under U.S. Federal Law? Choose one answer.

    A:Section 2701
    B:Section 1029
    C:Section 2510
    D:Section 1028
    __________________________________________________ _________________________________________

    Question 5
    Which of the following addresses the secrecy and privacy of information?

    A:Availability
    B:Authentication
    C:Integrity
    D: Confidentiality__________________________________________________ _________________________________________

    Question 6:
    This type of security test might seek to target the CEO?s laptop or the organization?s backup tapes to extract critical information, usernames, and passwords. Choose one answer.

    A:physical entry
    B:Outsider attack
    C:Stolen equipment
    D:Insider attack __________________________________________________ _________________________________________

    Question 7:
    Which of the following best describes an attack that altered the contents of two critical files?

    A:Authentication
    B:Confidentiality
    C:Availability
    D:Integrity
    __________________________________________________ _________________________________________

    Question 8:
    Which of the following is the most important step for the ethical hacker to perform during the preassessment?

    A:Obtain permission to hack
    B:Hack the web server.
    C:Obtain written permission to hack.
    D:Gather information about the target.
    __________________________________________________ _________________________________________

    Question 9:
    This type of security test typically takes on an adversarial role and looks to see what an outsider can access and control.

    A:policy assessment
    B:penetration test
    C:Network evaluation
    D:High level evaluation
    __________________________________________________ _________________________________________

    Question 10:
    Which of the following is one primary difference between a malicious hacker and an ethical hacker?

    A:Ethical hackers use the same methods but strive to do no harm
    B:Malicious hackers are more advanced than ethical hackers because they can use any
    C:Malicious hackers use different tools and techniques than ethical hackers do
    D:Ethical hackers obtain permission before bringing down servers or stealing credit card__________________________________________________ _________________________________________

    Question 11:
    Who are the individuals who perform legal security tests while sometimes performing questionable activities?

    A:Crackers
    B:Ethical hackers
    C:Whitehat hackers
    D:Grayhat hackers __________________________________________________ _________________________________________

    Question 12:

    Which individuals believe that hacking and defacing websites can promote social change?

    A:Ethical hackers
    B:Blackhat hackers
    C:Hacktivists
    D:Grayhat hackers
     
  10. linux7802

    linux7802 New Member

    Hi,

    Thank you , its really its very useful.
     
  11. praveen1

    praveen1 New Member

    I am just a n00b here and thanks its really gr8 tht ur helping us a lot and thanks 2 the admin as well.
     
  12. peeger1

    peeger1 New Member

    I am new to all this. how much does ethical hacking tyically cost if you were to contract someone....also how long would it take to complete?
     
  13. prathviraj

    prathviraj New Member

    Thanks a lot...
     
  14. Cleptography

    Cleptography New Member

    Great article, very well constructed.
    Cheers-
     
  15. brokencard

    brokencard New Member

    thanks for the class man :)
     
  16. Jitterbud

    Jitterbud New Member

    Question 1:
    In 2000, Mafiaboy launched an attack that knocked out eBay and Yahoo! for several hours. This attack targeted which of the following?

    A:Availability

    __________________________________________________


    Question 2:
    How many components are in a security evaluation?


    D:Three(Stuck on this one, possible to inform me also which ones the components in a security evauluation are please. Many thanks.)
    __________________________________________________


    Question 3:
    Hacker attacks, unauthorized access, and viruses and malware can all be described as what?


    B:Threats

    __________________________________________________


    Question 4:
    What is the main federal statute that addresses computer hacking under U.S. Federal Law? Choose one answer.


    B:Section 1029

    __________________________________________________

    Question 5
    Which of the following addresses the secrecy and privacy of information?


    D: Confidentiality
    __________________________________________________


    Question 6:
    This type of security test might seek to target the CEO?s laptop or the organization's backup tapes to extract critical information, usernames, and passwords. Choose one answer.


    C:Stolen equipment

    __________________________________________________


    Question 7:
    Which of the following best describes an attack that altered the contents of two critical files?


    D:Integrity

    __________________________________________________


    Question 8:
    Which of the following is the most important step for the ethical hacker to perform during the preassessment?


    C:Obtain written permission to hack.

    __________________________________________________


    Question 9:
    This type of security test typically takes on an adversarial role and looks to see what an outsider can access and control.


    B:penetration test

    __________________________________________________


    Question 10:
    Which of the following is one primary difference between a malicious hacker and an ethical hacker?

    D:Ethical hackers obtain permission before bringing down servers or stealing credit card
    __________________________________________________


    Question 11:
    Who are the individuals who perform legal security tests while sometimes performing questionable activities?


    D:Grayhat hackers
    __________________________________________________


    Question 12:

    Which individuals believe that hacking and defacing websites can promote social change?


    C:Hacktivists
     
  17. Digitalsec

    Digitalsec New Member

    Thanks for sharing.
    Your Ethical Hacking basic class tutorials are nice.
    one of my friend studying Certified Ethical Cracker Course at infysec Chennai who referred your website, I like your website very much. :)
     
  18. thanks for all the info:D
     
  19. rapstarx

    rapstarx Banned

    hey guys i wana learn hacking can anyone help me out. im really new in this sorts of things
     
  20. matrix4u

    matrix4u New Member

    Wow, you are awesome! More grease to your elbow... Thumbs up for you
     

Share This Page