Best Ethical Hacking Interview Preparation in Nagercoil
Part 1 Part 2

CEH Interview Questions

Complete Guide - 100 Essential Questions & Answers

100
Questions Covered
13
Major Topics
2024
Latest Updates
CEH v13
Version Coverage
🔍

🔐 Fundamentals and Ethics

Q1 Easy
What are common penetration testing tools?

Frameworks:

  • Metasploit
  • Core Impact
  • Canvas

Scanners:

  • Nmap
  • Nessus
  • OpenVAS

Web:

  • Burp Suite
  • OWASP ZAP
  • SQLmap

Network:

  • Wireshark
  • Ettercap
  • Aircrack-ng

🚀 Advanced Topics

Q71 Hard
What is a zero-day vulnerability?

Unknown vulnerability with no patch:

  • Not publicly disclosed
  • No vendor patch available
  • High value in black market
  • Used in targeted attacks
  • Responsible disclosure important
Q72 Hard
Explain the kill chain model.

Cyber attack phases:

  1. Reconnaissance: Research target
  2. Weaponization: Create malware
  3. Delivery: Send to target
  4. Exploitation: Execute code
  5. Installation: Install malware
  6. Command & Control: Establish C2
  7. Actions on Objectives: Achieve goals
Q73 Hard
What is threat hunting?

Proactive search for threats:

  • Assumes breach occurred
  • Uses indicators of compromise (IoCs)
  • Behavioral analysis
  • Threat intelligence
  • Log analysis
  • Network forensics
Q74 Medium
What is OSINT and its sources?

Open Source Intelligence:

Sources:

  • Social media
  • Public records
  • News articles
  • Job postings
  • Conference presentations
  • GitHub repositories

Tools: Maltego, Shodan, theHarvester

Q75 Medium
What is the difference between IDS and IPS?

IDS (Intrusion Detection):

  • Monitors and alerts
  • Passive, out-of-band
  • No blocking action
  • Detective control

IPS (Intrusion Prevention):

  • Monitors and blocks
  • Active, inline
  • Automatic response
  • Preventive control
Q76 Medium
What are honeypots and honeynets?

Honeypot:

  • Decoy system
  • Attracts attackers
  • Monitors behavior
  • Early warning system

Honeynet:

  • Network of honeypots
  • More realistic
  • Better intelligence
  • Research purposes
Q77 Medium
What is defense in depth?

Multiple layers of security:

  • Physical security
  • Network security
  • Host security
  • Application security
  • Data security
  • Policies and procedures
  • User awareness
Q78 Hard
Explain incident response phases.
  1. Preparation: Plans, team, tools
  2. Identification: Detect incident
  3. Containment: Limit damage
  4. Eradication: Remove threat
  5. Recovery: Restore operations
  6. Lessons Learned: Post-incident review
Q79 Medium
What are indicators of compromise (IoCs)?

Evidence of intrusion:

  • Unusual network traffic
  • Unknown processes
  • Registry modifications
  • Suspicious files
  • Abnormal system behavior
  • Unauthorized access attempts
  • C2 communications
Q80 Hard
What is MITRE ATT&CK framework?

Knowledge base of adversary tactics:

  • Tactics: What attackers want
  • Techniques: How they do it
  • Procedures: Specific implementations
  • Used for threat modeling
  • Improves detection capabilities

⚖️ Compliance and Legal

Q81 Medium
What are important compliance frameworks?
  • PCI DSS: Payment card security
  • HIPAA: Healthcare data
  • GDPR: EU data protection
  • SOX: Financial reporting
  • ISO 27001: Information security
  • NIST: Cybersecurity framework
Q82 Hard
What legal considerations apply to ethical hacking?
  • Written authorization required
  • Defined scope and boundaries
  • Respect privacy laws
  • Non-disclosure agreements
  • Liability limitations
  • Evidence handling
  • Report security
Q83 Medium
What is responsible disclosure?

Ethical vulnerability reporting:

  1. Discover vulnerability
  2. Notify vendor privately
  3. Allow time for patch
  4. Coordinate disclosure
  5. Public release
  6. Usually 90-day window

☁️ Cloud Security

Q84 Medium
What are cloud security concerns?
  • Data sovereignty
  • Shared responsibility model
  • Multi-tenancy risks
  • API security
  • Identity management
  • Compliance
  • Vendor lock-in
  • Data loss
Q85 Hard
What is the shared responsibility model?

Cloud Provider:

  • Physical security
  • Infrastructure
  • Hypervisor
  • Network controls

Customer:

  • Data encryption
  • Identity management
  • Application security
  • OS patching
  • Configuration

📡 IoT Security

Q86 Medium
What are IoT security challenges?
  • Default credentials
  • Lack of updates
  • Weak encryption
  • Physical access
  • Limited resources
  • Long deployment life
  • Diverse protocols
  • Scale of deployment
Q87 Medium
How do you secure IoT devices?
  • Change default passwords
  • Regular updates
  • Network segmentation
  • Encryption
  • Secure boot
  • Code signing
  • Monitor behavior
  • Physical security

📱 Mobile Security

Q88 Medium
What are mobile security threats?
  • Malicious apps
  • Network attacks
  • Physical access
  • App vulnerabilities
  • Jailbreaking/rooting
  • Lost devices
  • Bluetooth attacks
  • Social engineering
Q89 Medium
What is mobile device management (MDM)?

Centralized device control:

  • Remote wipe
  • App management
  • Policy enforcement
  • Encryption
  • Access control
  • Compliance monitoring
  • Asset tracking

🔧 Practical Scenarios

Q90 Hard
How would you test a web application for vulnerabilities?
  1. Information gathering
  2. Configuration testing
  3. Authentication testing
  4. Session management
  5. Input validation
  6. Error handling
  7. Cryptography
  8. Business logic
  9. Client-side testing
  10. Create report
Q91 Hard
What steps would you take if you discovered a breach?
  1. Don't panic
  2. Isolate affected systems
  3. Preserve evidence
  4. Identify scope
  5. Notify stakeholders
  6. Begin containment
  7. Document everything
  8. Eradicate threat
  9. Recover systems
  10. Lessons learned
Q92 Hard
How would you secure a new network?
  1. Network segmentation
  2. Firewall configuration
  3. IDS/IPS deployment
  4. Access controls
  5. Patch management
  6. Logging/monitoring
  7. Encryption
  8. Backup strategy
  9. Incident response plan
  10. User training
Q93 Medium
What would you look for in a security assessment?
  • Open ports/services
  • Default credentials
  • Missing patches
  • Misconfigurations
  • Weak passwords
  • Unnecessary services
  • Audit settings
  • Physical security
  • User awareness
  • Policy compliance
Q94 Easy
How do you stay updated with security threats?
  • Security blogs/news
  • Vulnerability databases
  • Security conferences
  • Professional communities
  • Threat intelligence feeds
  • Vendor advisories
  • Security podcasts
  • Training/certifications
  • Lab practice
  • Bug bounty programs
Q95 Medium
What makes a good penetration tester?
  • Technical skills
  • Analytical thinking
  • Persistence
  • Creativity
  • Ethics
  • Communication skills
  • Continuous learning
  • Attention to detail
  • Documentation skills
  • Legal awareness

Best Practices

Q96 Medium
What are security best practices for organizations?
  • Least privilege principle
  • Defense in depth
  • Regular patching
  • Strong authentication
  • Encryption
  • Monitoring/logging
  • Incident response plan
  • Security awareness training
  • Regular assessments
  • Backup and recovery
Q97 Easy
What are password best practices?
  • Minimum 12 characters
  • Complexity requirements
  • No dictionary words
  • Unique per account
  • Regular changes
  • Password managers
  • Multi-factor authentication
  • No password sharing
  • Secure storage
  • Account lockout policies
Q98 Medium
What are secure coding practices?
  • Input validation
  • Output encoding
  • Parameterized queries
  • Least privilege
  • Error handling
  • Secure authentication
  • Session management
  • Encryption
  • Code reviews
  • Security testing
Q99 Medium
What are network security best practices?
  • Segmentation
  • Firewall rules
  • IDS/IPS
  • VPN for remote access
  • Disable unnecessary services
  • Regular updates
  • Monitor logs
  • Access controls
  • Encrypted protocols
  • Network documentation
Q100 Easy
What advice would you give someone starting in cybersecurity?
  • Build strong fundamentals
  • Get hands-on experience
  • Set up home lab
  • Pursue certifications
  • Join communities
  • Attend conferences
  • Read constantly
  • Practice ethically
  • Develop soft skills
  • Never stop learning
Q3 Easy
What's the difference between a hacker, cracker and ethical hacker?
  • Hacker: Originally meant a skilled programmer who could solve complex problems
  • Cracker: A malicious hacker who breaks into systems without permission for personal gain
  • Ethical Hacker: A security professional who performs authorized security testing to help organizations identify and fix vulnerabilities
Q2 Medium
What are the five phases of ethical hacking?
  1. Reconnaissance - Gathering information about the target
  2. Scanning - Identifying live systems, open ports, and services
  3. Gaining Access - Exploiting vulnerabilities to enter the system
  4. Maintaining Access - Installing backdoors to ensure continued access
  5. Covering Tracks - Hiding evidence of the intrusion
Q3 Easy
Explain the CIA triad in information security.
  • Confidentiality: Ensuring information is accessible only to authorized individuals
  • Integrity: Maintaining the accuracy and completeness of data
  • Availability: Ensuring authorized users have reliable access to information when needed
Q4 Medium
What are the main types of hackers based on their intent?
  • White Hat: Ethical hackers who work with authorization
  • Black Hat: Malicious hackers who break laws for personal gain
  • Gray Hat: Hackers who may violate laws but without malicious intent
  • Script Kiddies: Inexperienced hackers using pre-made tools
  • Hacktivists: Hackers motivated by political or social causes
  • State-Sponsored: Government-backed hackers
  • Suicide Hackers: Hackers who don't care about consequences
Q5 Hard
What is the importance of getting written authorization before penetration testing?

Written authorization is crucial because it:

  • Provides legal protection for the tester
  • Defines the scope and boundaries of testing
  • Establishes rules of engagement
  • Protects against criminal prosecution
  • Clarifies liability and responsibilities

🔍 Footprinting and Reconnaissance

Q6 Medium
What is the difference between passive and active footprinting?
  • Passive Footprinting: Gathering information without directly interacting with the target (using public sources, social media, search engines)
  • Active Footprinting: Directly interacting with the target system (port scanning, network mapping, social engineering calls)
Q7 Easy
What information can you gather from a WHOIS lookup?
  • Domain owner information
  • Administrative and technical contacts
  • Domain registration and expiration dates
  • Name servers
  • IP address ranges
  • Physical addresses
  • Email addresses
  • Phone numbers
Q8 Hard
Explain Google dorking and provide examples.

Google dorking uses advanced search operators to find sensitive information. Examples:

site:example.com filetype:pdf - Find PDF files on a specific site intitle:"index of" password - Find directories containing password files inurl:admin site:example.com - Find admin pages "@company.com" ext:sql - Find SQL files with email addresses
Q9 Hard
What is DNS zone transfer and why is it a security concern?

DNS zone transfer (AXFR) is a mechanism to replicate DNS databases across servers. It's a security concern because:

  • Can reveal all DNS records for a domain
  • Exposes internal network structure
  • Shows all subdomains and hosts
  • May reveal internal IP addresses
Command: dig axfr @dns-server domain.com
Q10 Medium
What tools are commonly used for footprinting?
  • WHOIS tools: whois, Sam Spade
  • DNS tools: nslookup, dig, host, dnsrecon
  • Web tools: HTTrack, Wget, Archive.org
  • Network tools: traceroute, ping
  • OSINT frameworks: Maltego, FOCA, theHarvester

📡 Scanning and Enumeration

Q11 Medium
Explain the TCP three-way handshake.
  1. SYN: Client sends SYN packet to server
  2. SYN-ACK: Server responds with SYN-ACK
  3. ACK: Client sends ACK to complete connection

This establishes a reliable connection before data transfer

Q12 Hard
What are the different types of port scanning techniques?
  • TCP Connect Scan: Full three-way handshake, logged
  • SYN Scan (Half-open): Only SYN packet sent, stealthier
  • FIN Scan: Sends FIN packets, works on Unix
  • XMAS Scan: Sets FIN, PSH, and URG flags
  • NULL Scan: No flags set
  • ACK Scan: Used to map firewall rules
  • UDP Scan: For UDP services
  • IDLE/Zombie Scan: Uses a zombie host for scanning
Q13 Medium
What is the difference between vulnerability scanning and port scanning?
  • Port Scanning: Identifies open ports and services running
  • Vulnerability Scanning: Goes deeper to identify specific vulnerabilities, misconfigurations, and security weaknesses in the discovered services
Q14 Hard
What are the main Nmap switches and their purposes?
-sS : SYN scan (stealth scan) -sT : TCP connect scan -sU : UDP scan -sV : Version detection -O : OS detection -A : Aggressive scan (OS, version, scripts) -p : Specify ports -Pn : Skip host discovery -T[0-5] : Timing templates
Q15 Medium
What is banner grabbing and how is it performed?

Banner grabbing captures service banners to identify versions and types. Methods:

Telnet: telnet target 80 then GET / HTTP/1.0 Netcat: nc -nv target 80 Nmap: nmap -sV target
  • HTTP: Send HTTP requests and analyze headers
Q16 Medium
What information can be enumerated from NetBIOS?
  • Computer names
  • Domain names
  • User accounts
  • Group memberships
  • Share information
  • Password policies
  • Running services
  • Tools: enum4linux, nbtscan, net commands
Q17 Hard
What is SNMP enumeration and what are community strings?

SNMP (Simple Network Management Protocol) enumeration extracts information using:

  • Community Strings: Passwords for SNMP access
  • Public: Read-only access (default)
  • Private: Read-write access (default)
  • Information gathered: System info, network interfaces, routing tables, device configurations

🎯 Sniffing and Evasion

Q18 Easy
What is the difference between promiscuous and non-promiscuous mode?
  • Promiscuous Mode: NIC captures all packets on the network segment, regardless of destination
  • Non-Promiscuous Mode: NIC only captures packets destined for its MAC address
Q19 Hard
Explain ARP poisoning and how it works.

ARP poisoning involves sending fake ARP messages to associate the attacker's MAC with another host's IP:

  1. Attacker sends ARP replies to victim and gateway
  2. Both update their ARP tables with attacker's MAC
  3. Traffic flows through attacker (MITM position)
  4. Tools: Cain & Abel, Ettercap, arpspoof
Q20 Medium
What is MAC flooding and how does it work?

MAC flooding overwhelms a switch's CAM table:

  1. Attacker sends numerous packets with different source MACs
  2. CAM table fills up (limited size)
  3. Switch fails open, acting like a hub
  4. All traffic is broadcast to all ports
  5. Tool: macof
Q21 Medium
How can you detect if a network card is in promiscuous mode?
  • Send ARP requests for non-existent IPs
  • Check response times for packets not destined for the host
  • Use tools like PromiscDetect or Promqry
  • Check local system with ifconfig (Linux) or device manager (Windows)
Q22 Hard
What are some IDS evasion techniques?
  • Fragmentation: Split packets into fragments
  • Encryption: Encrypt malicious payloads
  • Obfuscation: Encode attacks differently
  • Session splicing: Split attacks across packets
  • Decoy scans: Hide real source among decoys
  • Timing attacks: Slow down attack pace
  • Protocol-level evasion: Use uncommon protocols

💻 System Hacking

Q23 Medium
What are the main password attack types?
  1. Dictionary Attack: Using wordlists
  2. Brute Force: Trying all combinations
  3. Hybrid Attack: Dictionary + modifications
  4. Rainbow Tables: Pre-computed hashes
  5. Keylogging: Capturing keystrokes
  6. Social Engineering: Tricking users
  7. Shoulder Surfing: Physical observation
Q24 Hard
How does Windows store passwords and what are LM and NTLM hashes?

Passwords stored in SAM file (C:\Windows\System32\config)

  • LM Hash:
    • Converts to uppercase
    • Pads to 14 characters
    • Splits into 2x7 character parts
    • Very weak, easily cracked
  • NTLM Hash:
    • MD4 hash of password
    • Case-sensitive
    • Stronger than LM but still vulnerable
Q25 Hard
What is pass-the-hash attack?

An attack where an attacker uses a password hash directly without cracking it:

  • Captures hash from memory or network
  • Uses hash to authenticate to other systems
  • Works because Windows accepts hash for authentication
  • Tools: Mimikatz, PTH-suite
Q26 Hard
Explain privilege escalation techniques.
  • Vertical: User to administrator/root
  • Horizontal: User to another user

Techniques:

  • Exploit unpatched vulnerabilities
  • Misconfigurations
  • Weak permissions
  • DLL hijacking
  • Kernel exploits
  • Social engineering
Q27 Hard
What is an alternate data stream (ADS) in NTFS?

ADS allows hiding data behind files:

  • Feature of NTFS for compatibility with Mac HFS
  • Syntax: file.txt:hidden.txt
Create: type secret.txt > file.txt:hidden.txt Execute: start file.txt:hidden.exe Detection: dir /r or specialized tools
Q28 Medium
How do you cover tracks after system compromise?
  • Clear event logs (but don't delete entirely)
  • Disable auditing
  • Modify timestamps
  • Hide files (ADS, hidden attributes)
  • Use rootkits
  • Clear command history
  • Remove created accounts
  • Clean Registry entries

🎭 Social Engineering

Q29 Medium
What are the main types of social engineering attacks?

Human-based:

  • Impersonation
  • Dumpster diving
  • Shoulder surfing
  • Tailgating/Piggybacking
  • Reverse social engineering

Computer-based:

  • Phishing
  • Spear phishing
  • Whaling
  • Vishing (voice)
  • Smishing (SMS)
  • Baiting
Q30 Easy
How can you identify a phishing email?
  • Generic greetings ("Dear Customer")
  • Spelling and grammar errors
  • Suspicious sender addresses
  • Urgency or threats
  • Requests for sensitive information
  • Mismatched URLs (hover to check)
  • Unexpected attachments
  • Too good to be true offers
Q31 Medium
What is pretexting?

Creating a fabricated scenario to gain trust and extract information:

  • Impersonating authority figures
  • Creating false emergencies
  • Building rapport over time
  • Using insider knowledge
  • Exploiting helpful nature
Q32 Hard
Explain the steps in reverse social engineering.
  1. Sabotage: Create a problem
  2. Advertising: Present yourself as the solution
  3. Assisting: Victim contacts you for help
  4. Information gathering: Extract credentials during "help"

🌐 Web Application Security

Q33 Hard
What is SQL injection and how does it work?

SQL injection inserts malicious SQL code into application queries:

  • Basic test: Single quote (')
  • Authentication bypass: ' OR 1=1--

Common payloads:

admin' -- ' OR '1'='1 '; DROP TABLE users--

Prevention: Parameterized queries, input validation

Q34 Hard
Explain different types of SQL injection.
  • Union-based: Uses UNION to combine results
  • Error-based: Extracts data from error messages
  • Blind SQLi: No visible output, uses true/false conditions
  • Time-based Blind: Uses time delays to infer data
  • Second-order: Payload executed later
Q35 Medium
What is Cross-Site Scripting (XSS)?

XSS injects malicious scripts into web pages:

  • Reflected XSS: Payload in request, immediately reflected
  • Stored XSS: Payload stored in database
  • DOM-based XSS: Manipulates DOM environment

Example: <script>alert('XSS')</script>

Impact: Session theft, defacement, redirection

Q36 Hard
What is a buffer overflow attack?

Writing more data than allocated buffer space:

  • Stack overflow: Overflows stack memory
  • Heap overflow: Overflows heap memory
  • NOP sled: Series of NOP instructions
  • Exploits poor boundary checking
  • Can execute arbitrary code
Q37 Medium
Explain directory traversal attacks.

Accessing files outside web root:

  • Uses ../ (dot-dot-slash)
  • Example: http://site.com/../../etc/passwd
  • Unicode encoding: %2e%2e%2f
  • Also called path traversal
  • Prevention: Input validation, access controls
Q38 Medium
What is parameter tampering?

Modifying parameters in:

  • URLs: ?price=100 changed to ?price=1
  • Hidden fields in HTML
  • Cookies
  • HTTP headers
  • Form fields

Prevention: Server-side validation

Q39 Hard
How do you identify and test for web vulnerabilities?

Manual testing:

  • Input validation testing
  • Authentication testing
  • Session management testing

Automated tools:

  • Burp Suite
  • OWASP ZAP
  • Nikto
  • SQLmap
  • Acunetix

📶 Wireless Security

Q40 Easy
What are the different wireless standards and their characteristics?
  • 802.11a: 54 Mbps, 5 GHz
  • 802.11b: 11 Mbps, 2.4 GHz
  • 802.11g: 54 Mbps, 2.4 GHz
  • 802.11n: 100+ Mbps, 2.4/5 GHz
  • 802.11ac: 1+ Gbps, 5 GHz
Q41 Hard
Explain WEP and why it's insecure.

WEP (Wired Equivalent Privacy) weaknesses:

  • 24-bit IV (Initialization Vector) too small
  • IV reuse leads to key recovery
  • No key management
  • Weak integrity check
  • Can be cracked in minutes
  • Tools: Aircrack-ng, Cain & Abel
Q42 Medium
What is the difference between WPA, WPA2, and WPA3?
  • WPA: TKIP encryption, stronger than WEP
  • WPA2: AES encryption, current standard
  • WPA3: Latest standard, SAE handshake, forward secrecy
  • Enterprise versions use 802.1X authentication
Q43 Medium
What is a rogue access point?

Unauthorized AP on network:

  • Evil Twin: Mimics legitimate AP
  • Captures credentials
  • MITM attacks
  • Data theft
  • Detection: Site surveys, WIDS
Q44 Hard
Explain the WEP cracking process.
  1. Start monitor mode: airmon-ng start wlan0
  2. Capture packets: airodump-ng mon0
  3. Generate traffic: aireplay-ng -3 -b [BSSID] mon0
  4. Crack key: aircrack-ng capture.cap
  5. Need 50,000+ packets for reliable cracking
Q45 Easy
What is war driving and war chalking?
  • War Driving: Searching for wireless networks while moving
  • War Chalking: Marking locations with symbols indicating:
    • Open networks: )(
    • Closed networks: )(—
    • WEP networks: )(W
    • SSID/password often included
Q46 Medium
What are Bluetooth attack types?
  • Bluejacking: Sending unsolicited messages
  • Bluesnarfing: Stealing information
  • Bluebugging: Taking control of device
  • BlueBorne: Spreading malware
  • Bluesmacking: DoS attack

🦠 Malware and Trojans

Q47 Medium
What are the different types of viruses?
  • Boot Sector: Infects boot sector
  • File Infector: Attaches to executables
  • Macro: Uses application macros
  • Polymorphic: Changes code signature
  • Metamorphic: Rewrites itself completely
  • Multipartite: Multiple infection methods
  • Stealth: Hides from detection
Q48 Easy
What is the difference between a virus, worm, and Trojan?
  • Virus: Requires host file, user action to spread
  • Worm: Self-replicating, spreads automatically
  • Trojan: Appears legitimate, doesn't self-replicate
  • Logic Bomb: Triggers on condition
  • Rootkit: Hides presence, maintains access
Q49 Hard
What are common Trojan ports?
  • Back Orifice: 31337, 31338
  • NetBus: 12345, 12346
  • Tini: 7777
  • Deep Throat: 2140, 3150
  • SubSeven: 27374
  • Beast: 6666
Q50 Medium
How do you detect and prevent Trojans?

Detection:

  • Monitor ports: netstat -an
  • Check processes
  • Registry monitoring
  • File integrity checking
  • Network traffic analysis

Prevention:

  • Antivirus software
  • Firewall rules
  • User education
  • Principle of least privilege
  • Application whitelisting
Q51 Hard
What is a rootkit and what are its types?

Software that hides malicious presence:

  • Application-level: Replaces executables
  • Kernel-level: Modifies kernel
  • Hardware/Firmware: BIOS/UEFI infection
  • Bootkit: Infects MBR
  • Library-level: Patches system libraries

Detection: GMER, RootkitRevealer

Denial of Service

Q52 Medium
What are the main types of DoS attacks?
  • Volume-based: Flood bandwidth (ICMP, UDP floods)
  • Protocol: Exploit protocol weaknesses (SYN flood)
  • Application: Overwhelm application resources
  • Distributed (DDoS): Multiple attacking systems
  • Permanent (PDoS): Damages hardware
Q53 Hard
Explain how a SYN flood attack works.
  1. Attacker sends many SYN packets
  2. Uses spoofed source IPs
  3. Server allocates resources for each
  4. Sends SYN-ACK to fake addresses
  5. No ACK received, connections half-open
  6. Connection table fills up
  7. Legitimate connections refused
Q54 Medium
What is a Smurf attack?
  1. Attacker sends ICMP echo to broadcast address
  2. Source IP spoofed as victim's IP
  3. All hosts reply to victim
  4. Victim overwhelmed with responses
  5. Amplification effect
  6. Prevention: Disable directed broadcasts
Q55 Medium
What are botnet and DDoS tools?

Botnets: Zeus, Mirai, Conficker

DDoS Tools:

  • LOIC (Low Orbit Ion Cannon)
  • HOIC
  • Slowloris
  • R.U.D.Y
  • Trinity
Q56 Hard
How do you mitigate DoS attacks?
  • Rate limiting
  • SYN cookies
  • Increase connection queue
  • Firewall rules
  • IPS/IDS deployment
  • CDN/DDoS protection services
  • Blackholing
  • Upstream filtering

🔗 Session Hijacking

Q57 Hard
What is session hijacking and how does it work?

Taking over an established session:

  1. Sniff network traffic
  2. Predict sequence numbers
  3. Desynchronize legitimate client
  4. Inject packets with predicted sequence
  5. Take over session
Q58 Medium
What are the types of session hijacking?
  • Active: Attacker takes over session
  • Passive: Attacker monitors session
  • Network-level: TCP/IP hijacking
  • Application-level: HTTP session hijacking
  • Man-in-the-Browser: Browser-based
Q59 Hard
What is session fixation?

Attacker sets victim's session ID:

  1. Attacker obtains valid session ID
  2. Forces victim to use this ID
  3. Victim authenticates
  4. Attacker uses known session ID
  5. Prevention: Regenerate session ID after login
Q60 Medium
How do you prevent session hijacking?
  • Use HTTPS/TLS encryption
  • Implement session timeouts
  • Regenerate session IDs
  • Validate session tokens
  • Check IP address consistency
  • Use unpredictable session IDs
  • Implement proper logout
  • Educate users

🔒 Cryptography

Q61 Medium
What is the difference between symmetric and asymmetric encryption?

Symmetric:

  • Same key for encryption/decryption
  • Fast
  • Examples: AES, DES, 3DES
  • Key distribution problem

Asymmetric:

  • Public/private key pair
  • Slower
  • Examples: RSA, ECC, DSA
  • Solves key distribution
Q62 Medium
What are hash functions and their properties?

One-way mathematical functions:

Properties:

  • Fixed output length
  • Irreversible
  • Avalanche effect
  • Collision resistant

Common algorithms:

  • MD5 (128-bit, broken)
  • SHA-1 (160-bit, deprecated)
  • SHA-256/512 (secure)
Q63 Hard
What is a digital signature?

Provides authentication and non-repudiation:

  1. Hash the message
  2. Encrypt hash with private key
  3. Attach to message
  4. Recipient decrypts with public key
  5. Verifies hash matches
  6. Proves sender identity and integrity
Q64 Hard
Explain Public Key Infrastructure (PKI).

Framework for digital certificates:

Components:

  • Certificate Authority (CA)
  • Registration Authority (RA)
  • Certificate database
  • Certificate store

Process:

  • Key generation
  • Certificate signing
  • Distribution
  • Revocation
Q65 Medium
What is steganography?

Hiding data within other data:

Types:

  • Image (LSB manipulation)
  • Audio
  • Video
  • Text

Tools: Steghide, OpenStego, S-Tools

Detection: Statistical analysis, steganalysis tools

🛡️ Penetration Testing

Q66 Medium
What are the types of penetration testing?

By knowledge:

  • Black Box: No prior knowledge
  • White Box: Full knowledge
  • Gray Box: Partial knowledge

By location:

  • External: From outside network
  • Internal: From inside network

By announcement:

  • Announced: Staff aware
  • Unannounced: Staff unaware
Q67 Hard
What are the phases of penetration testing?
  1. Pre-engagement: Scope, authorization, rules
  2. Intelligence Gathering: Reconnaissance
  3. Threat Modeling: Identify attack vectors
  4. Vulnerability Analysis: Scanning, enumeration
  5. Exploitation: Gaining access
  6. Post-Exploitation: Privilege escalation, persistence
  7. Reporting: Documentation, recommendations
Q68 Medium
What should a penetration test report contain?
  • Executive summary
  • Scope and methodology
  • Risk ratings
  • Detailed findings
  • Evidence/screenshots
  • Remediation recommendations
  • Technical details
  • Test dates and team
Q69 Medium
What is the difference between vulnerability assessment and penetration testing?

Vulnerability Assessment:

  • Identifies vulnerabilities
  • Doesn't exploit
  • Broader coverage
  • Automated tools
  • Regular frequency

Penetration Testing:

  • Exploits vulnerabilities
  • Proves impact
  • Focused approach
  • Manual + automated
  • Less frequent