Which definition among those given below best describes a covert channel?
A.
A server program using a port that is not well known.
B.
Making use of a protocol in a way it is not intended to be used.
C.
It is the multiplexing taking place on a communication link.
D.
It is one of the weak channels used by WEP which makes it insecure
Making use of a protocol in a way it is not intended to be used.
This kind of password cracking method uses word lists in combination with numbers and
special characters:
A.
Hybrid
B.
Linear
C.
Symmetric
D.
Brute Force
Hybrid
Steven connected his iPhone to a public computer that had been infected by Clark, an
attacker. After establishing the connection with the public computer, Steven enabled iTunes
WI-FI sync on the computer so that the device could continue communication with that
computer even after being physically disconnected. Now, Clark gains access to Steven’s
iPhone through the infected computer and is able to monitor and read all of Steven’s
activity on the iPhone, even after the device is out of the communication zone.
Which of the following attacks is performed by Clark in above scenario?
A.
IOS trustjacking
B.
lOS Jailbreaking
C.
Exploiting SS7 vulnerability
D.
Man-in-the-disk attack
IOS trustjacking
Explanation: An iPhone client’s most noticeably terrible bad dream is to have somebody
oversee his/her gadget, including the capacity to record and control all action without
waiting be in a similar room. In this blog entry, we present another weakness called
“Trustjacking”, which permits an aggressor to do precisely that.
This weakness misuses an iOS highlight called iTunes Wi-Fi sync, which permits a client to
deal with their iOS gadget without genuinely interfacing it to their PC. A solitary tap by the
iOS gadget proprietor when the two are associated with a similar organization permits an
assailant to oversee the gadget. Furthermore, we will stroll through past related
weaknesses and show the progressions that iPhone has made to alleviate them, and why
these are adequately not to forestall comparative assaults.
After interfacing an iOS gadget to another PC, the clients are being found out if they trust
the associated PC or not. Deciding to believe the PC permits it to speak with the iOS
gadget by means of the standard iTunes APIs.
This permits the PC to get to the photographs on the gadget, perform reinforcement,
introduce applications and considerably more, without requiring another affirmation from
the client and with no recognizable sign. Besides, this permits enacting the “iTunes Wi-Fi
sync” highlight, which makes it conceivable to proceed with this sort of correspondence
with the gadget even after it has been detached from the PC, as long as the PC and the
iOS gadget are associated with a similar organization. It is intriguing to take note of that
empowering “iTunes Wi-Fi sync” doesn’t need the casualty’s endorsement and can be
directed simply from the PC side.
Getting a live stream of the gadget’s screen should be possible effectively by consistently
requesting screen captures and showing or recording them distantly.
It is imperative to take note of that other than the underlying single purpose of
disappointment, approving the vindictive PC, there is no other component that forestalls
this proceeded with access. Likewise, there isn’t anything that informs the clients that by
approving the PC they permit admittance to their gadget even in the wake of detaching the
USB link.
Which utility will tell you in real time which ports are listening or in another state?
A.
Netstat
B.
TCPView
C.
Nmap
D.
Loki
TCPView
Alice, a professional hacker, targeted an organization's cloud services. She infiltrated the
targets MSP provider by sending spear-phishing emails and distributed custom-made
malware to compromise user accounts and gain remote access to the cloud service.
Further, she accessed the target customer profiles with her MSP account, compressed the
customer data, and stored them in the MSP. Then, she used this information to launch
further attacks on the target organization. Which of the following cloud attacks did Alice
perform in the above scenario?
A.
Cloud hopper attack
B.
Cloud cryptojacking
C.
Cloudborne attack
D.
Man-in-the-cloud (MITC) attack
Cloud hopper attack
Explanation: Operation Cloud Hopper was an in depth attack and theft of data in 2017
directed at MSP within the uk (U.K.), us (U.S.), Japan, Canada, Brazil, France, Switzerland,
Norway, Finland, Sweden, South Africa , India, Thailand, South Korea and Australia. The
group used MSP as intermediaries to accumulate assets and trade secrets from MSP client
engineering, MSP industrial manufacturing, retail, energy, pharmaceuticals,
telecommunications, and government agencies.Operation Cloud Hopper used over 70
variants of backdoors, malware and trojans. These were delivered through spear-phishing
emails. The attacks scheduled tasks or leveraged services/utilities to continue Microsoft
Windows systems albeit the pc system was rebooted. It installed malware and hacking
tools to access systems and steal data
Page 32 out of 104 Pages |
Previous |