Ethical Hacking Basics Class part 1

Discussion in 'Ethical hacking Tips' started by XXxxImmortalxxXX, Jul 7, 2008.

  1. naimish

    naimish New Member

    Joined:
    Jun 29, 2009
    Messages:
    1,043
    Likes Received:
    18
    Trophy Points:
    0
    Occupation:
    Software Engineer
    Location:
    On Earth
  2. !Newbie!

    !Newbie! New Member

    Joined:
    Apr 13, 2009
    Messages:
    128
    Likes Received:
    3
    Trophy Points:
    0
    Location:
    Around
    No, pen testing is penetration testing...
    USB hacking is hacking done through portable devices...
     
  3. naimish

    naimish New Member

    Joined:
    Jun 29, 2009
    Messages:
    1,043
    Likes Received:
    18
    Trophy Points:
    0
    Occupation:
    Software Engineer
    Location:
    On Earth
    Yeah, I tried it, but it was only fun.....is there any extreme trick for it ?
     
  4. shabbir

    shabbir Administrator Staff Member

    Joined:
    Jul 12, 2004
    Messages:
    15,336
    Likes Received:
    377
    Trophy Points:
    83
    Corrected the link which should not have a - at the end.
     
  5. naimish

    naimish New Member

    Joined:
    Jun 29, 2009
    Messages:
    1,043
    Likes Received:
    18
    Trophy Points:
    0
    Occupation:
    Software Engineer
    Location:
    On Earth
    Thanks, now I got it :)
     
  6. !Newbie!

    !Newbie! New Member

    Joined:
    Apr 13, 2009
    Messages:
    128
    Likes Received:
    3
    Trophy Points:
    0
    Location:
    Around
    No extreme trick as such which am aware currently, will look out and let you know if I find any...
     
  7. Adbest

    Adbest New Member

    Joined:
    May 28, 2010
    Messages:
    3
    Likes Received:
    0
    Trophy Points:
    0
    Occupation:
    Student
    Location:
    Karachi
    yeah. i have watched a bit of the movie too. The hackers says his handle is rat ;)
     
  8. unni krishnan.r

    unni krishnan.r Member

    Joined:
    Apr 20, 2010
    Messages:
    206
    Likes Received:
    3
    Trophy Points:
    18
    Occupation:
    education
    Location:
    Kerala
    Home Page:
    http://blogofunni.blogspot.com
    do anybody can Hack
     
  9. Tuhin Banerjee

    Tuhin Banerjee New Member

    Joined:
    Dec 12, 2010
    Messages:
    1
    Likes Received:
    0
    Trophy Points:
    0
    Hi, XXxxImmortalxxXX

    My answers are in bold, though it's an 1.5 years old thread, I have just posted my answers to get to know the correct one:

    Question 1:
    In 2000, Mafiaboy launched an attack that knocked out eBay and Yahoo! for several hours. This attack targeted which of the following?

    A:AvailabilityB:Integrity
    C:Confidentiality
    D:Authentication
    __________________________________________________ _________________________________________

    Question 2:
    How many components are in a security evaluation?

    A:Five
    B:Four
    C:Two
    D:Three__________________________________________________ _________________________________________

    Question 3:
    Hacker attacks, unauthorized access, and viruses and malware can all be described as what?

    A:Risk
    B:Threats
    C:Exploits
    D:Vulnerabilities
    __________________________________________________ _________________________________________

    Question 4:
    What is the main federal statute that addresses computer hacking under U.S. Federal Law? Choose one answer.

    A:Section 2701
    B:Section 1029
    C:Section 2510
    D:Section 1028
    __________________________________________________ _________________________________________

    Question 5
    Which of the following addresses the secrecy and privacy of information?

    A:Availability
    B:Authentication
    C:Integrity
    D: Confidentiality__________________________________________________ _________________________________________

    Question 6:
    This type of security test might seek to target the CEO?s laptop or the organization?s backup tapes to extract critical information, usernames, and passwords. Choose one answer.

    A:Physical entry
    B:Outsider attack
    C:Stolen equipment
    D:Insider attack __________________________________________________ _________________________________________

    Question 7:
    Which of the following best describes an attack that altered the contents of two critical files?

    A:Authentication
    B:Confidentiality
    C:Availability
    D:Integrity
    __________________________________________________ _________________________________________

    Question 8:
    Which of the following is the most important step for the ethical hacker to perform during the preassessment?

    A:Obtain permission to hack
    B:Hack the web server.
    C:Obtain written permission to hack.
    D:Gather information about the target.
    __________________________________________________ _________________________________________

    Question 9:
    This type of security test typically takes on an adversarial role and looks to see what an outsider can access and control.

    A:Policy assessment
    B:Penetration test
    C:Network evaluation
    D:High level evaluation
    __________________________________________________ _________________________________________

    Question 10:
    Which of the following is one primary difference between a malicious hacker and an ethical hacker?

    A:Ethical hackers use the same methods but strive to do no harm
    B:Malicious hackers are more advanced than ethical hackers because they can use any
    C:Malicious hackers use different tools and techniques than ethical hackers do
    D:Ethical hackers obtain permission before bringing down servers or stealing credit card__________________________________________________ _________________________________________

    Question 11:
    Who are the individuals who perform legal security tests while sometimes performing questionable activities?

    A:Crackers
    B:Ethical hackers
    C:Whitehat hackers
    D:Grayhat hackers __________________________________________________ _________________________________________

    Question 12:

    Which individuals believe that hacking and defacing websites can promote social change?

    A:Ethical hackers
    B:Blackhat hackers
    C:Hacktivists
    D:Grayhat hackers
     
  10. linux7802

    linux7802 New Member

    Joined:
    Sep 10, 2010
    Messages:
    2
    Likes Received:
    0
    Trophy Points:
    0
    Home Page:
    http://www.theperfectarts.com/
    Hi,

    Thank you , its really its very useful.
     
  11. praveen1

    praveen1 New Member

    Joined:
    Jan 11, 2011
    Messages:
    5
    Likes Received:
    0
    Trophy Points:
    0
    I am just a n00b here and thanks its really gr8 tht ur helping us a lot and thanks 2 the admin as well.
     
  12. peeger1

    peeger1 New Member

    Joined:
    Jan 13, 2011
    Messages:
    5
    Likes Received:
    0
    Trophy Points:
    0
    Occupation:
    Computer Specialist
    Location:
    NJ
    I am new to all this. how much does ethical hacking tyically cost if you were to contract someone....also how long would it take to complete?
     
  13. prathviraj

    prathviraj New Member

    Joined:
    Mar 17, 2011
    Messages:
    1
    Likes Received:
    0
    Trophy Points:
    0
    Occupation:
    Student
    Location:
    Mangalore
    Thanks a lot...
     
  14. Cleptography

    Cleptography New Member

    Joined:
    Sep 2, 2010
    Messages:
    39
    Likes Received:
    7
    Trophy Points:
    0
    Great article, very well constructed.
    Cheers-
     
  15. brokencard

    brokencard New Member

    Joined:
    Apr 22, 2011
    Messages:
    1
    Likes Received:
    0
    Trophy Points:
    0
    thanks for the class man :)
     
  16. Jitterbud

    Jitterbud New Member

    Joined:
    Jan 18, 2012
    Messages:
    1
    Likes Received:
    0
    Trophy Points:
    0
    Question 1:
    In 2000, Mafiaboy launched an attack that knocked out eBay and Yahoo! for several hours. This attack targeted which of the following?

    A:Availability

    __________________________________________________


    Question 2:
    How many components are in a security evaluation?


    D:Three(Stuck on this one, possible to inform me also which ones the components in a security evauluation are please. Many thanks.)
    __________________________________________________


    Question 3:
    Hacker attacks, unauthorized access, and viruses and malware can all be described as what?


    B:Threats

    __________________________________________________


    Question 4:
    What is the main federal statute that addresses computer hacking under U.S. Federal Law? Choose one answer.


    B:Section 1029

    __________________________________________________

    Question 5
    Which of the following addresses the secrecy and privacy of information?


    D: Confidentiality
    __________________________________________________


    Question 6:
    This type of security test might seek to target the CEO?s laptop or the organization's backup tapes to extract critical information, usernames, and passwords. Choose one answer.


    C:Stolen equipment

    __________________________________________________


    Question 7:
    Which of the following best describes an attack that altered the contents of two critical files?


    D:Integrity

    __________________________________________________


    Question 8:
    Which of the following is the most important step for the ethical hacker to perform during the preassessment?


    C:Obtain written permission to hack.

    __________________________________________________


    Question 9:
    This type of security test typically takes on an adversarial role and looks to see what an outsider can access and control.


    B:Penetration test

    __________________________________________________


    Question 10:
    Which of the following is one primary difference between a malicious hacker and an ethical hacker?

    D:Ethical hackers obtain permission before bringing down servers or stealing credit card
    __________________________________________________


    Question 11:
    Who are the individuals who perform legal security tests while sometimes performing questionable activities?


    D:Grayhat hackers
    __________________________________________________


    Question 12:

    Which individuals believe that hacking and defacing websites can promote social change?


    C:Hacktivists
     
  17. Digitalsec

    Digitalsec New Member

    Joined:
    May 28, 2010
    Messages:
    1
    Likes Received:
    0
    Trophy Points:
    0
    Thanks for sharing.
    Your Ethical Hacking basic class tutorials are nice.
    one of my friend studying Certified Ethical Cracker Course at infysec Chennai who referred your website, I like your website very much. :)
     
  18. blueyzblkdragon

    blueyzblkdragon Banned

    Joined:
    Apr 27, 2012
    Messages:
    2
    Likes Received:
    0
    Trophy Points:
    0
    thanks for all the info:D
     
  19. rapstarx

    rapstarx Banned

    Joined:
    May 1, 2012
    Messages:
    2
    Likes Received:
    0
    Trophy Points:
    0
    hey guys i wana learn hacking can anyone help me out. im really new in this sorts of things
     
  20. matrix4u

    matrix4u New Member

    Joined:
    Sep 3, 2011
    Messages:
    3
    Likes Received:
    0
    Trophy Points:
    0
    Wow, you are awesome! More grease to your elbow... Thumbs up for you
     

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice