Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

08 7 B9 D 80 C1 8 B8 D 82

08 075 5B92 2D3 3801 1C1 78AAB8 4D0 082 223


07 B D 8 C 78 B 4D 8 22 B
07 5B9 92D 380 01C 178 AB 84D 082 222 3B1 1220
5 1 A 8 3
75 B92 2D3 3801 1C1 78A B8 4D0 0822 223 B12 2208 8075
B9 D 80 C1 78 B 4D 82 23 B1 20 07 B
5B 2D 38 1C 7 AB 84 08 22 B 22 80 5B 92
92 3 01 1 8A 8 D0 2 3 12 08 7 9 D

N.B.
92 D38 801 C17 78A B84 4D0 822 223B B12 208 075 5B92 2D3 3801
D C B 8 2 0

66622
2D 380 01C 178 8AB 84DD08 222 23B1 122 080 75B B92DD38 801C C17
3 8 1 C 1 7 A 8 4 0 2 2 3 B 2 2
08 75 92 3 01 1 8A
D3 01 1 8A B8 D 82 23 12 0 07 B9 D 80 C 78 B
8 7 4 0 2 B 8 5 3 1 1 A 8
38 01C C178 8AB B84 D08 8222 23B 122 2080 075B B92 2D38 801 C17 78A B84 4D0
01 17 A 84 D0 22 3B 12 08 75 9 D3 01 C1 8A B8 D 82
01 C17 8A B84 D0 822 23B 12 208 075 B9 2D3 801 C1 78A B8 4D 082 223
C 2 2 0
1C 178 8AB B84DD08 8222 23B 122 080 075B B92 D38 801C C17 78A B84 4D0 822 223B B12
17 AB 84 0 22 3B 122 08 75 92 D3 01 17 8A B8 D0 822 23 12 208
8A 8 D0 82 23 12 08 07 B9 D 80 C1 8A B8 4D 82 23 B1 20 07
B8 4D 82 223 B1 20 07 5B9 2D 380 1C 78 B 4D 08 22 B1 220 80 5B
4D 082 22 B1 220 807 5B 2D 38 1C 178 AB 84D 08 222 3B 22 80 75B 92

a) Enumeration
08 22 3B1 22 80 5B 92D 38 01C 17 AB 84 08 22 3B 122 08 75 92 D3
22 3B 22 08 75 92 3 01 1 8A 8 D0 22 23 12 08 07 B9 D 80

c) System hacking
23 12 08 07 B9 D 80 C1 78 B 4D 82 23 B1 20 07 5B 2D 38 1C

a) Denial of service
B1 20 07 5B 2D 38 1C 78 AB 84 08 22 B 22 80 5B 92 38 01 17
22 80 5B 92 38 01C 17 A 84 D0 22 3B 122 08 75 92 D3 01 C1 8A
08 75 92 D3 01 1 8A B8 D0 82 23 12 08 07 B9 D 80 C1 78 B

c) Hardware keylogger
c) DNS server locations
07 B9 D 80 C 78 B 4D 82 22 B1 20 07 5B 2D 38 1C 78 AB 84
5B 2D 38 1C 17 AB 84 08 22 3B 22 80 5B 92 3 01 17 A 84 D0
Q. 1 Attempt All the Questions
92 38 01 17 8A 84 D0 22 3B 12 08 75 92 D3 801 C1 8A B8 D 82
D3 01 C1 8A B8 D 82 23 12 20 07 B9 D 80 C 78 B 4D 08 22
(a) Multiple Choice Questions:

c) Grey, black and white hat


80 C1 78A B8 4D 082 223 B1 20 807 5B 2D 380 1C 178 AB 84D 08 222 3B
1C 78 B 4D 08 22 B 22 80 5B 92 38 1C 17 A 84 0 22 3B 12

weak physical security controls?


a) Host names and IP addresses
17 AB 84 0 22 3B 122 08 75 92 D3 01 17 8A B8 D0 822 23 12 208
8A 8 D0 82 23 12 08 07 B9 D 80 C1 8A B8 4D 82 23 B1 20 07
1) All questions are compulsory.

a) Port, network and vulnerability


B8 4D 82 223 B1 20 07 5B9 2D 380 1C 78 B 4D 08 22 B1 220 80 5B
4D 082 22 B1 220 807 5B 2D 38 1C 178 AB 84D 08 222 3B 22 80 75B 92

4. What are the three types of scanning?


08 22 3B1 22 80 5B 92D 38 01C 17 AB 84 08 22 3B 122 08 75 92 D3
22 3B 22 08 75 92 3 01 1 8A 8 D0 22 23 12 08 07 B9 D 80
2) Figures to the right indicate marks.

23 12 08 07 B9 D 80 C1 78 B 4D 82 23 B1 20 07 5B 2D 38 1C
B1 20 07 5B 2D 38 1C 78 AB 84 08 22 B 22 80 5B 92 38 01 17
(2½ Hours)

22 80 5B 92 38 01C 17 A 84 D0 22 3B 122 08 75 92 D3 01 C1 8A
4) Mixing of sub-questions is not allowed.

08 75 92 D3 01 1 8A B8 D0 82 23 12 08 07 B9 D 80 C1 78 B
07 B9 D 80 C 78 B 4D 82 22 B1 20 07 5B 2D 38 1C 78 AB 84
5B 2D 38 1C 17 AB 84 08 22 3B 22 80 5B 92 3 01 17 A 84 D0

Page 1 of 2
92 38 01 17 8A 84 D0 22 3B 12 08 75 92 D3 801 C1 8A B8 D 82
D3 01 C1 8A B8 D 82 23 12 20 07 B9 D 80 C 78 B 4D 08 22
80 C1 78A B8 4D 082 223 B1 20 807 5B 2D 380 1C 178 AB 84D 08 222 3B
1C 78 B 4D 08 22 B 22 80 5B 92 38 1C 17 A 84 0 22 3B 12
17 AB 84 0 22 3B 122 08 75 92 D3 01 17 8A B8 D0 822 23 12 208
8A 8 D0 82 23 12 08 07 B9 D 80 C1 8A B8 4D 82 23 B1 20 07
2. What is the next step to be performed after footprinting?
b) Scanning
B8 4D 82 223 B1 20 07 5B9 2D 380 1C 78 B 4D 08 22 B1 220 80 5B
4D 082 22 B1 220 807 5B 2D 38 1C 178 AB 84D 08 222 3B 22 80 75B 92
d) Security does not affect functionality and ease of use.

08 22 3B1 22 80 5B 92D 38 01C 17 AB 84 08 22 3B 122 08 75 92 D3


22 3B 22 08 75 92 3 01 1 8A 8 D0 22 23 12 08 07 B9 D 80

(b) Fill in the blanks (Use following pool to answer questions)

4. ___________ is the best countermeasure to session hijacking.


23 12 08 07 B9 D 80 C1 78 B 4D 82 23 B1 20 07 5B 2D 38 1C
B1 20 07 5B 2D 38 1C 78 AB 84 08 22 B 22 80 5B 92 38 01 17

d) Banner grabbing
22 80 5B 92 38 01C 17 A 84 D0 22 3B 122 08 75 92 D3 01 C1 8A

2208075B92D3801C178AB84D082223B1
a) As security increases, functionality and ease of use increase.
b) As security decreases, functionality and ease of use increase.

08 75 92 D3 01 1 8A B8 D0 82 23 12 08 07 B9 D 80 C1 78 B
c) As security decreases, functionality and ease of use decrease.

b) Whois information
07 B9 D 80 C 78 B 4D 82 22 B1 20 07 5B 2D 38 1C 78 AB 84
5B 2D 38 1C 17 AB 84 08 22 3B 22 80 5B 92 3 01 17 A 84 D0

tools that predict the next sequence number used in the TCP session.
3) Illustrations, in-depth answers and diagrams will be appreciated.

92 38 01 17 8A 84 D0 22 3B 12 08 75 92 D3 801 C1 8A B8 D 82

[Encryption, active, honeypot, DoS, LAND, passive, hash, packet]


D3 01 C1 8A B8 D 82 23 12 20 07 B9 D 80 C 78 B 4D 08 22
Paper / Subject Code: 87007 / Ethical Hacking

80 C1 78A B8 4D 082 223 B1 20 807 5B 2D 380 1C 178 AB 84D 08 222 3B

b) Radio frequency jamming


1C 78 B 4D 08 22 B 22 80 5B 92 38 1C 17 A 84 0 22 3B 12

d) Server, client and network


b) Port, network and services
17 AB 84 0 22 3B 122 08 75 92 D3 01 17 8A B8 D0 822 23 12 208
8A 8 D0 82 23 12 08 07 B9 D 80 C1 8A B8 4D 82 23 B1 20 07
d) Active information gathering

B8 4D 82 223 B1 20 07 5B9 2D 380 1C 78 B 4D 08 22 B1 220 80 5B


1. The security, functionality, and ease of use triangle illustrates which concept?

3. Nslookup can be used to gather information regarding which of the following?

4D 082 22 B1 220 807 5B 2D 38 1C 178 AB 84D 08 222 3B 22 80 75B 92

5. _________ is a system designed to attract probes, attacks and potential exploits.


08 22 3B1 22 80 5B 92D 38 01C 17 AB 84 08 22 3B 122 08 75 92 D3
22 3B 22 08 75 92 3 01 1 8A 8 D0 22 23 12 08 07 B9 D 80
23 12 08 07 B9 D 80 C1 78 B 4D 82 23 B1 20 07 5B 2D 38 1C
B1 20 07 5B 2D 38 1C 78 AB 84 08 22 B 22 80 5B 92 38 01 17

2. A ________ attack works by preventing legitimate users from accessing the system.
3. ________ sniffing allows individuals to capture data as transmitted over the network.
22 80 5B 92 38 01C 17 A 84 D0 22 3B 122 08 75 92 D3 01 C1 8
08 75 92 D3 01 1 8A B8 D0 82 23 12 08 07 B9 D 80 C1 78
07 B9 D 80 C 78 B 4D 82 22 B1 20 07 5B 2D 38 1C 78 A
5B 2D 38 1C 17 AB 84 08 22 3B 22 80 5B 92 3 01 17 A
[Total Marks: 75]

d) Name server types and operating systems

92 38 01 17 8A 84 D0 22 3B 12 08 75 92 D3 801 C1 8A B
D3 01 C1 8A B8 D 82 23 12 20 07 B9 D 80 C 78 B
80 C1 78A B8 4D 082 223 B1 20 807 5B 2D 380 1C 178 AB 8

1. In ________ attack, an attacker finds an active session and takes over the session by using
5. Which of the following attacks can be perpetrated by a hacker against an organization with
1C 78 B 4D 08 22 B 22 80 5B 92 38 1C 17 A 84
17 AB 84 0 22 3B 122 08 75 92 D3 01 17 8A B8
8A 8 D0 82 23 12 08 07 B9 D 80 C1 8A B8 4D
B8 4D 82 223 B1 20 07 5B9 2D 380 1C 78 B 4D 0
4D 082 22 B1 220 807 5B 2D 38 1C 178 AB 84D 08
08 22 3B1 22 80 5B 92D 38 01C 17 AB 84 08
22 3B 22 08 75 92 3 01 1 8A 8 D0 2
(15M)

23 12 08 07 B9 D 80 C1 78 B 4D 82
B1 20 07 5B 2D 38 1C 78 AB 84 08 22
22 80 5B 92 38 01C 17 A 84 D0 22
08 75 92 D3 01 1 8A B8 D0 82 23
07 B9 D 80 C 78 B 4D 82 22
5 2 3 1 17 A 8 0 2 3B
08 7 B9 D 80 C1 8 B8 D 82
08 075 5B92 2D3 3801 1C1 78AAB8 4D0 082 223
07 B D 8 C 78 B 4D 8 22 B
07 5B9 92D 380 01C 178 AB 84D 082 222 3B1 1220
5 1 A 8 3
75 B92 2D3 3801 1C1 78A B8 4D0 0822 223 B12 2208 8075
B9 D 80 C1 78 B 4D 82 23 B1 20 07 B
5B 2D 38 1C 7 AB 84 08 22 B 22 80 5B 92

(f)
(f)
(f)

(e)
(c)
(a)
(e)
(c)
(a)
(e)
(c)
(a)
(e)
(c)
(a)

Q. 5
Q. 4
Q. 3

(d)
(b)
(d)
(b)
(d)
(b)
(d)
(b)
92 3 01 1 8A 8 D0 2 3 12 08 7 9 D

Q. 2
(c)

5.
4.
3.
2.
1.
92 D38 801 C17 78A B84 4D0 822 223B B12 208 075 5B92 2D3 3801
D C B 8 2 0

66622
2D 380 01C 178 8AB 84DD08 222 23B1 122 080 75B B92DD38 801C C17
3 8 1 C 1 7 A 8 4 0 2 2 3 B 2 2
08 75 92 3 01 1 8A
D3 01 1 8A B8 D 82 23 12 0 07 B9 D 80 C 78 B
8 7 4 0 2 B 8 5 3 1 1 A 8
38 01C C178 8AB B84 D08 8222 23B 122 2080 075B B92 2D38 801 C17 78A B84 4D0
01 17 A 84 D0 22 3B 12 08 75 9 D3 01 C1 8A B8 D 82
01 C17 8A B84 D0 822 23B 12 208 075 B9 2D3 801 C1 78A B8 4D 082 223
C 2 2 0
1C 178 8AB B84DD08 8222 23B 122 080 075B B92 D38 801C C17 78A B84 4D0 822 223B B12

a. XSS
17 AB 84 0 22 3B 122 08 75 92 D3 01 17 8A B8 D0 822 23 12 208
8A 8 D0 82 23 12 08 07 B9 D 80 C1 8A B8 4D 82 23 B1 20 07
B8 4D 82 223 B1 20 07 5B9 2D 380 1C 78 B 4D 08 22 B1 220 80 5B

a. Customizable
following point:
4D 082 22 B1 220 807 5B 2D 38 1C 178 AB 84D 08 222 3B 22 80 75B 92

a. Eavesdropping
08 22 3B1 22 80 5B 92D 38 01C 17 AB 84 08 22 3B 122 08 75 92 D3
Define IPSpoofing

22 3B 22 08 75 92 3 01 1 8A 8 D0 22 23 12 08 07 B9 D 80
23 12 08 07 B9 D 80 C1 78 B 4D 82 23 B1 20 07 5B 2D 38 1C

Information Security.
B1 20 07 5B 2D 38 1C 78 AB 84 08 22 B 22 80 5B 92 38 01 17

Define the Following:


What is click Jacking?

22 80 5B 92 38 01C 17 A 84 D0 22 3B 122 08 75 92 D3 01 C1 8A
What is a Security log?

08 75 92 D3 01 1 8A B8 D0 82 23 12 08 07 B9 D 80 C1 78 B
07 B9 D 80 C 78 B 4D 82 22 B1 20 07 5B 2D 38 1C 78 AB 84
5B 2D 38 1C 17 AB 84 08 22 3B 22 80 5B 92 3 01 17 A 84 D0
92 38 01 17 8A 84 D0 22 3B 12 08 75 92 D3 801 C1 8A B8 D 82

Explain the following terms:


D3 01 C1 8A B8 D 82 23 12 20 07 B9 D 80 C 78 B 4D 08 22
What is reverse WWW shell?

80 C1 78A B8 4D 082 223 B1 20 807 5B 2D 380 1C 178 AB 84D 08 222 3B

b. Security
1C 78 B 4D 08 22 B 22 80 5B 92 38 1C 17 A 84 0 22 3B 12
17 AB 84 0 22 3B 122 08 75 92 D3 01 17 8A B8 D0 822 23 12 208
8A 8 D0 82 23 12 08 07 B9 D 80 C1 8A B8 4D 82 23 B1 20 07

Explain Cross site request forgery.


B8 4D 82 223 B1 20 07 5B9 2D 380 1C 78 B 4D 08 22 B1 220 80 5B

Attempt the following (Any THREE)


Attempt the following (Any THREE)
4D 082 22 B1 220 807 5B 2D 38 1C 178 AB 84D 08 222 3B 22 80 75B 92

Write a short note on MAC Spoofing.


Answer in ONE or TWO sentences:

08 22 3B1 22 80 5B 92D 38 01C 17 AB 84 08 22 3B 122 08 75 92 D3

Attempt the following (Any THREE)


Attempt the following (Any THREE)

22 3B 22 08 75 92 3 01 1 8A 8 D0 22 23 12 08 07 B9 D 80

Describe the Intrusion detection system.

d. d. Packet Sniffing e. Scanning


23 12 08 07 B9 D 80 C1 78 B 4D 82 23 B1 20 07 5B 2D 38 1C
B1 20 07 5B 2D 38 1C 78 AB 84 08 22 B 22 80 5B 92 38 01 17

Write a short note on security testing plan.

Explain in brief the metasploit framework.

Define Attack and Explain types of attacks.


22 80 5B 92 38 01C 17 A 84 D0 22 3B 122 08 75 92 D3 01 C1 8A
08 75 92 D3 01 1 8A B8 D0 82 23 12 08 07 B9 D 80 C1 78 B
07 B9 D 80 C 78 B 4D 82 22 B1 20 07 5B 2D 38 1C 78 AB 84
5B 2D 38 1C 17 AB 84 08 22 3B 22 80 5B 92 3 01 17 A 84 D0

Page 2 of 2
c. Efficiency
What is Cookie Theft? Explain its functionality.

92 38 01 17 8A 84 D0 22 3B 12 08 75 92 D3 801 C1 8A B8 D 82
D3 01 C1 8A B8 D 82 23 12 20 07 B9 D 80 C 78 B 4D 08 22
80 C1 78A B8 4D 082 223 B1 20 807 5B 2D 380 1C 178 AB 84D 08 222 3B
What is malware? Explain in brief concept of Virus.

1C 78 B 4D 08 22 B 22 80 5B 92 38 1C 17 A 84 0 22 3B 12
17 AB 84 0 22 3B 122 08 75 92 D3 01 17 8A B8 D0 822 23 12 208

Write a short note on Crawling with suitable example.


Explain the term DoS and list the types of DoS attack.

8A 8 D0 82 23 12 08 07 B9 D 80 C1 8A B8 4D 82 23 B1 20 07
b. Man-in-the-middle

Explain in brief Steganography with respect to hacking.


B8 4D 82 223 B1 20 07 5B9 2D 380 1C 78 B 4D 08 22 B1 220 80 5B
4D 082 22 B1 220 807 5B 2D 38 1C 178 AB 84D 08 222 3B 22 80 75B 92

Explain pattern matching to known vulnerability Database

What is OWASP mobile top 10? Explain any one in detail.


08 22 3B1 22 80 5B 92D 38 01C 17 AB 84 08 22 3B 122 08 75 92 D3
22 3B 22 08 75 92 3 01 1 8A 8 D0 22 23 12 08 07 B9 D 80

Define Threat. Explain iterative process in Threat Modelling.


23 12 08 07 B9 D 80 C1 78 B 4D 82 23 B1 20 07 5B 2D 38 1C

What is VOIP? Explain in detail any two VOIP vulnerabilities.


B1 20 07 5B 2D 38 1C 78 AB 84 08 22 B 22 80 5B 92 38 01 17

__________________________
Compare Windows and Linux operating systems on the basis of
22 80 5B 92 38 01C 17 A 84 D0 22 3B 122 08 75 92 D3 01 C1 8A

2208075B92D3801C178AB84D082223B1
08 75 92 D3 01 1 8A B8 D0 82 23 12 08 07 B9 D 80 C1 78 B
07 B9 D 80 C 78 B 4D 82 22 B1 20 07 5B 2D 38 1C 78 AB 84 What is Scanning? List and explain types of scanning performed.

a. Penetration testing b. Vulnerability Assessment c. NDA


Define the Term Vulnerability. Explain any two from the following.
5B 2D 38 1C 17 AB 84 08 22 3B 22 80 5B 92 3 01 17 A 84 D0
92 38 01 17 8A 84 D0 22 3B 12 08 75 92 D3 801 C1 8A B8 D 82
D3 01 C1 8A B8 D 82 23 12 20 07 B9 D 80 C 78 B 4D 08 22
What are the ways in which an IDS is able to detect intrusion attempts?
Paper / Subject Code: 87007 / Ethical Hacking

80 C1 78A B8 4D 082 223 B1 20 807 5B 2D 380 1C 178 AB 84D 08 222 3B


1C 78 B 4D 08 22 B 22 80 5B 92 38 1C 17 A 84 0 22 3B 12

b. SQL Injection c. Insufficient logging and monitoring


Explain Black, Gray and White Box Penetration Testing methods in detail.

17 AB 84 0 22 3B 122 08 75 92 D3 01 17 8A B8 D0 822 23 12 208


8A 8 D0 82 23 12 08 07 B9 D 80 C1 8A B8 4D 82 23 B1 20 07
B8 4D 82 223 B1 20 07 5B9 2D 380 1C 78 B 4D 08 22 B1 220 80 5B
4D 082 22 B1 220 807 5B 2D 38 1C 178 AB 84D 08 222 3B 22 80 75B 92
08 22 3B1 22 80 5B 92D 38 01C 17 AB 84 08 22 3B 122 08 75 92 D3
Define session Hijacking. Describe the three steps involved in session hijacking.

22 3B 22 08 75 92 3 01 1 8A 8 D0 22 23 12 08 07 B9 D 80
23 12 08 07 B9 D 80 C1 78 B 4D 82 23 B1 20 07 5B 2D 38 1C
B1 20 07 5B 2D 38 1C 78 AB 84 08 22 B 22 80 5B 92 38 01 17
22 80 5B 92 38 01C 17 A 84 D0 22 3B 122 08 75 92 D3 01 C1 8
08 75 92 D3 01 1 8A B8 D0 82 23 12 08 07 B9 D 80 C1 78
07 B9 D 80 C 78 B 4D 82 22 B1 20 07 5B 2D 38 1C 78 A
5B 2D 38 1C 17 AB 84 08 22 3B 22 80 5B 92 3 01 17 A
92 38 01 17 8A 84 D0 22 3B 12 08 75 92 D3 801 C1 8A B
D3 01 C1 8A B8 D 82 23 12 20 07 B9 D 80 C 78 B
80 C1 78A B8 4D 082 223 B1 20 807 5B 2D 380 1C 178 AB 8
What is Information Security? Explain Asset, Risk, Threat, Vulnerability with respect to

1C 78 B 4D 08 22 B 22 80 5B 92 38 1C 17 A 84
17 AB 84 0 22 3B 122 08 75 92 D3 01 17 8A B8
8A 8 D0 82 23 12 08 07 B9 D 80 C1 8A B8 4D
B8 4D 82 223 B1 20 07 5B9 2D 380 1C 78 B 4D 0
4D 082 22 B1 220 807 5B 2D 38 1C 178 AB 84D 08
08 22 3B1 22 80 5B 92D 38 01C 17 AB 84 08
(15M)

(15M)
(15M)

22 3B 22 08 75 92 3 01 1 8A 8 D0 2
(15M)

23 12 08 07 B9 D 80 C1 78 B 4D 82
B1 20 07 5B 2D 38 1C 78 AB 84 08 22
22 80 5B 92 38 01C 17 A 84 D0 22
08 75 92 D3 01 1 8A B8 D0 82 23
07 B9 D 80 C 78 B 4D 82 22
5 2 3 1 17 A 8 0 2 3B

You might also like