Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Actions that would be best classified as a social engineering attack : (circle a

ID: 3866272 • Letter: A

Question

Actions that would be best classified as a social engineering attack: (circle all that apply)

run traceroute against network machines

email a “sexy photo” that is really spyware

look for world readable/writable files

use nmap to port scan machines

steal a harddrive from a machine

lookup info in whois database

convince somebody to let you into computer lab after hours

run a password cracker like 55hb (targets SSH)

use netcat/telnet to do banner grabbing

run Wireshark on a machine

A)

run traceroute against network machines

B)

email a “sexy photo” that is really spyware

C)

look for world readable/writable files

D)

use nmap to port scan machines

E)

steal a harddrive from a machine

F)

lookup info in whois database

G)

convince somebody to let you into computer lab after hours

H)

run a password cracker like 55hb (targets SSH)

I)

use netcat/telnet to do banner grabbing

J)

run Wireshark on a machine

Explanation / Answer

Social engineering is like manipulating people so they give up confidential information.Confidential information it may be passwords or bank information or giving your computer.

A)traceroute against network machines.

traceroute is for getting path of target machine.

B)email a "sexy photo" that is really spyware..

Sending this type of emails and get our email passwords or some other information of us

D)use nmap to port scan machines

So that he knows which port is available to get into our systems or like that

E)steal harddrive from a machine

Sometimes they steal our harddrive for important information or they forget harddrive some place to target someone.If targeted one use that harddrive hacker get information

H)run a password like 55hb(targets ssh)

ssh means secure shell login .if he gets that password he get logon our system.we are in their hand.

I)use netcat/telnet to do banner grabbing

these are also grabbing ssh banner

J)run Wireshark on a machine

So that he can know the network traffic like how many packets sending all that information.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote