Most Asked Ethical Hacking Interview Questions and Answers
What is password shadowing?
Password shadowing is a security system where the encrypted password field of /etc/password is replaced with a special token and the encrypted password is stored in a seperate file which is not readable by normal system users.
To defeat password shadowing on many systems, write a program that uses successive calls to getpwent() to obtain the password file.
struct passwd *p;
printf(“%s:%s:%d:%d:%s:%s:%sn”, p->pw_name, p->pw_passwd,
p->pw_uid, p->pw_gid, p->pw_gecos, p->pw_dir, p->pw_shell);
What are the types of computer based social engineering attacks? What is Phishing?
Computer based social engineering attacks are
Phishing technique involves sending false e-mails, chats or website to impersonate real system with aim of stealing information from original website.
What is Network Sniffing?
A network sniffer monitors data flowing over computer network links. By allowing you to capture and view the packet level data on your network, sniffer tool can help you to locate network problems. Sniffers can be used for both stealing information off a network and also for legitimate network management.
What is ARP Spoofing or ARP poisoning?
ARP (Address Resolution Protocol) is a form of attack in which an attacker changes MAC ( Media Access Control) address and attacks an internet LAN by changing the target computer’s ARP cache with a forged ARP request and reply packets.
How do I break out of a restricted shell?
On poorly implemented restricted shells you can break out of the restricted environment by running a program that features a shell function. A good example is vi. Run vi and use this command:
then shell using this command:
How you can avoid or prevent ARP poisoning?
ARP poisoning can be prevented by following methods
Packet Filtering : Packet filters are capable for filtering out and blocking packets with conflicting source address information
Avoid trust relationship : Organization should develop protocol that rely on trust relationship as little as possible
Use ARP spoofing detection software : There are programs that inspects and certifies data before it is transmitted and blocks data that is spoofed
Use cryptographic network protocols : By using secure communications protocols like TLS, SSH, HTTP secure prevents ARP spoofing attack by encrypting data prior to transmission and authenticating data when it is received
What is a hacking loop?
A loop is two phone numbers connected together by the phone company for testing purposes. A loop has a high end and a low end. If you dial the high end, you will hear nothing. Not even a ring. If you dial the low end, you will hear an annoying 1,000hz tone for several seconds. If you connect to the high end and someone dials the low
end, you can speak to each other.
What is Brute Force Hack?
What is Mac Flooding?
Mac Flooding is a technique where the security of given network switch is compromised. In Mac flooding the hacker or attacker floods the switch with large number of frames, then what a switch can handle. This make switch behaving as a hub and transmits all packets at all the ports. Taking the advantage of this the attacker will try to send his packet inside the network to steal the sensitive information.
What is DHCP Rogue Server?
A Rogue DHCP server is DHCP server on a network which is not under the control of administration of network staff. Rogue DHCP Server can be a router or modem. It will offer users IP addresses , default gateway, WINS servers as soon as user’s logged in. Rogue server can sniff into all the traffic sent by client to all other networks.
What is Cross-site scripting and what are the types of Cross site scripting?
Cross site scripting is done by using the known vulnerabilities like web based applications, their servers or plug-ins users rely upon. Exploiting one of these by inserting malicious coding into a link which appears to be a trustworthy source. When users click on this link the malicious code will run as a part of the client’s web request and execute on the user’s computer, allowing attacker to steal information.
There are three types of Cross-site scripting:
Server side versus DOM based vulnerabilities