Actions that would be best classified as a social engineering attack : (circle a
ID: 3866272 • Letter: A
Question
Actions that would be best classified as a social engineering attack: (circle all that apply)
run traceroute against network machines
email a “sexy photo” that is really spyware
look for world readable/writable files
use nmap to port scan machines
steal a harddrive from a machine
lookup info in whois database
convince somebody to let you into computer lab after hours
run a password cracker like 55hb (targets SSH)
use netcat/telnet to do banner grabbing
run Wireshark on a machine
A)run traceroute against network machines
B)email a “sexy photo” that is really spyware
C)look for world readable/writable files
D)use nmap to port scan machines
E)steal a harddrive from a machine
F)lookup info in whois database
G)convince somebody to let you into computer lab after hours
H)run a password cracker like 55hb (targets SSH)
I)use netcat/telnet to do banner grabbing
J)run Wireshark on a machine
Explanation / Answer
Social engineering is like manipulating people so they give up confidential information.Confidential information it may be passwords or bank information or giving your computer.
A)traceroute against network machines.
traceroute is for getting path of target machine.
B)email a "sexy photo" that is really spyware..
Sending this type of emails and get our email passwords or some other information of us
D)use nmap to port scan machines
So that he knows which port is available to get into our systems or like that
E)steal harddrive from a machine
Sometimes they steal our harddrive for important information or they forget harddrive some place to target someone.If targeted one use that harddrive hacker get information
H)run a password like 55hb(targets ssh)
ssh means secure shell login .if he gets that password he get logon our system.we are in their hand.
I)use netcat/telnet to do banner grabbing
these are also grabbing ssh banner
J)run Wireshark on a machine
So that he can know the network traffic like how many packets sending all that information.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.