Posts

Showing posts from January, 2018

system hacking

types of password attacks non-electronice attacks active online attacks passive online attacks offline attack ==================== active online attacks trojan/spyware/keylogger/usb drive dictionary brute forcing rule based attack Hash injection attack =========================== default passwords switches routers hubs online tools to search default passwords ==================== passive online attack: wire sniffing attackers run packet sniffer tools MITM and replay attack ===================== offline attack: rainbow table attack === rtgen and winrtgen compare the hashes easy to recover offline attack:  distrubuted network attack elcomsoft  : distrubuted password recovery microsoft authentication SAM NTLM authentication == NTLM auth process LM authentication kerbros authentication how hash passwords are stored in windows SAM C:\windows\sysytem32\config\sam password salting pwdump7 and fgdump password cracking tools L0phtcrack ophcra
wisdomjobs ceh

CEH interview questions

CEH Interview Questions What is Ethical Hacking and an Ethical Hacker? Ethical hacking and ethical hacker are terms used to describe hacking performed by a company or individual to help identify potential threats on a computer or network. An ethical hacker attempts to bypass system security and search for any weak points that could be exploited by malicious hackers. Ethical hacking refers to the act of locating weaknesses and vulnerabilities of computer and information systems by duplicating the intent and actions of malicious hackers. Ethical hacking is also known as penetration testing, intrusion testing, or red teaming. What are the tools used for ethical hacking? These are the few tools used for ethical hacking. Metasploit Acunetix is a web vulnerability scanner (WVS) that scans and finds out the flaws in a website that could prove fatal. Nmap. Wireshark. oclHashcat. Nessus Vulnerability Scanner. Maltego. Why is ethical hacking so important? As oppose

wireshark cheatsheet

WIRESHARK DISPLAY FILTERS PART 1 Ethernet packetlife.net ARP eth.addr eth.len eth.src arp.dst.hw_mac arp.proto.size eth.dst eth.lg eth.trailer arp.dst.proto_ipv4 arp.proto.type eth.ig eth.multicast eth.type arp.hw.size arp.src.hw_mac arp.hw.type arp.src.proto_ipv4 IEEE 802.1Q vlan.cfi vlan.id vlan.priority vlan.etype vlan.len arp.opcode vlan.trailer IPv4 ip.addr ip.fragment.overlap.conflict ip.checksum ip.fragment.toolongfragment ip.checksum_bad ip.fragments ip.checksum_good ip.hdr_len ip.dsfield ip.host ip.dsfield.ce ip.id ip.dsfield.dscp ip.len ip.dsfield.ect ip.proto ip.dst ip.reassembled_in ip.dst_host ip.src ip.flags ip.src_host ip.flags.df ip.tos ip.flags.mf ip.tos.cost ip.flags.rb ip.tos.delay ip.frag_offset ip.tos.precedence ip.fragment ip.tos.reliability ip.fragment.error ip.tos.throughput ip.fragment.multipletails ip.ttl ip.fragment.overlap ip.version IPv6 TCP tcp.ack tcp.options.qs tcp.checksum tcp.options.sack tcp.checksum_bad tcp.options.sack_le tcp.checksum_good tcp.opti

cissp cheat sheet

Image