Mason is footprinting an organization to gather competitive intelligence. He visits the company's
website for contact information and telephone numbers but does not find any. He knows the entire
staff directory was listed on their website 12 months. How can he find the directory?
You work as a penetration tester for Hammond Security Consultants. You are currently working on a
contractfor the state government of Californi
a. Your next step is to initiate a DoS attack on their network. Why wouldyou want to initiate a DoS
attack on a system you are testing?
What is the target host IP in the following command?
An attacker injects malicious query strings in user input fields to bypass web service authentication
mechanisms and to access back-end databases. Which of the following attacks is this?
Transmission Control Protocol (TCP) is a connection-oriented four layer protocol. It is responsible for
breaking messages into segments, re-assembling them at the destination station, and re-sending.
Which one of the following protocols does not use the TCP?
Michael works for Kimball Construction Company as senior security analyst. As part of yearly security
audit, Michael scans his network for vulnerabilities. Using Nmap, Michael conducts XMAS scan and
most of the ports scanned do not give a response. In what state are these ports?
Information gathering is performed to:
i) Collect basic information about the target company and its network
ii) Determine the operating system used, platforms running, web server versions, etc.
iii) Find vulnerabilities and exploits
Which of the following pen testing tests yields information about a companys technology
Timing is an element of port-scanning that can catch one unaware. If scans are taking too long to
complete or obvious ports are missing from the scan, various time parameters may need to be
Which one of the following scanned timing options in NMAPs scan is useful across slow WAN links
or to hide the scan?
SQL injection attacks are becoming significantly more popular amongst hackers and there has been
an estimated 69 percent increase of this attack type.
This exploit is used to great effect by the hacking community since it is the primary way to steal
sensitive data from web applications. It takes advantage of non-validated input vulnerabilities to pass
SQL commands through a web application for execution by a back-end database.
The below diagram shows how attackers launched SQL injection attacks on web applications.
Which of the following can the attacker use to launch an SQL injection attack?
Jim performed a vulnerability analysis on his network and found no potential problems. He runs
another utilitythat executes exploits against his system to verify the results of the vulnerability test.
The second utilityexecutes five known exploits against his network in which the vulnerability analysis
said were not exploitable.
What kind of results did Jim receive from his vulnerability analysis?