CEH interview questions

CEH Interview Questions

What is Ethical Hacking and an Ethical Hacker?
Ethical hacking and ethical hacker are terms used to describe hacking performed by a company or individual to help identify potential threats on a computer or network. An ethical hacker attempts to bypass system security and search for any weak points that could be exploited by malicious hackers.
Ethical hacking refers to the act of locating weaknesses and vulnerabilities of computer and information systems by duplicating the intent and actions of malicious hackers. Ethical hacking is also known as penetration testing, intrusion testing, or red teaming.
What are the tools used for ethical hacking?
These are the few tools used for ethical hacking.
  1. Metasploit
  2. Acunetix is a web vulnerability scanner (WVS) that scans and finds out the flaws in a website that could prove fatal.
  3. Nmap.
  4. Wireshark.
  5. oclHashcat.
  6. Nessus Vulnerability Scanner.
  7. Maltego.
Why is ethical hacking so important?
As opposed to malicious “black hat” hacking, ethical “white hat” hacking (also called penetration testing) involves using computer hacking skills to identify network security vulnerabilities and patch security holes before anyone can abuse them.
What are the stages of ethical hacking?
Here is a brief overview of the five phases of penetration testing (ethical hacking):
Phase 1 | Reconnaissance. Reconnaissance is the act of gathering preliminary data or intelligence on your target.
Phase 2 | Scanning.
Phase 3 | Gaining Access.
Phase 4 | Maintaining Access.
Phase 5 | Covering Tracks.
What are the types of hacking?
Types of Hacking are,
  • Website Hacking
  • Network Hacking
  • Ethical Hacking
  • Email Hacking
  • Password Hacking
  • Online Banking Hacking
  • Computer Hacking
What is Website Hacking?
Hacking a website means taking control from the website owner to a person who hacks the website.
What is Network Hacking?
Network Hacking is generally means gathering information about domain by using tools like Telnet, Ns look UP, Ping, Tracert, Netstat, etc… over the network.

Certified Ethical Hacker Interview Questions

What is Ethical Hacking?
Ethical hacking is where a person hacks to find weaknesses in a system and then usually patches them.
What is Email Hacking?
Email hacking is illicit access to an email account or email correspondence.
What is Password Hacking?
Password Hacking Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system.
What is Online Banking Hacking?
Online banking Hacking Unauthorized accessing bank accounts without knowing the password or without permission of account holder is known as Online banking hacking.
What is Computer Hacking?
Computer Hacking is when files on your computer are viewed, created, or edited without your authorization.
What is footprinting in hacking?
Footprinting is the first and most convenient way that hackers use to gather information. about computer systems and the companies they belong to. The purpose of footprinting to. learn as much as you can about a system, it’s remote access capabilities, its ports and. services, and the aspects of its security.
What is scanning in ethical hacking?
After footprinting and reconnaissance, scanning is the second phase of information gathering that hackers use to size up a network. Scanning is where they dive deeper into the system to look for valuable data and services in a specific IP address range.
What is Cowpatty?
coWPAtty Package Description. Implementation of an offline dictionary attack against WPA/WPA2 networks using PSK-based authentication (e.g. WPA-Personal). Cowpatty can implement an accelerated attack if a precomputed PMK file is available for the SSID that is being assessed.
Which programming language is used for hacking?
It’s best, actually, to learn all five of Python, C/C++, Java, Perl, and LISP. Besides being the most important hacking languages, they represent very different approaches to programming, and each will educate you in valuable ways.

Certified Ethical Hacker Practice Questions

Why is python used for hacking?
Most widely used scripting language for hackers is Python. Python has some important features that make it particularly useful for hacking, but probably most importantly, it has some pre-built libraries that provide some powerful functionality.
What programs do you use to hack?
Metasploit
Metasploit by Rapid 7.
Nessus Vulnerability Scanner.
Cain and Able Hacking software.
Kali Linux Penetration software.
Hydra Hacking software.
What are the types of hacking attacks?
Here are the some important hacking techniques that are commonly used to get your personal information in an unauthorized way.
Keylogger.
Denial of Service (DoS\DDoS)
Waterhole attacks.
Fake WAP.
Eavesdropping (Passive Attacks)
Phishing.
Virus, Trojan etc.
ClickJacking Attacks.
What are three types of hackers?
The three types of hackers are the white hat hacker, the grey hat hacker, and the black hat hacker. Each type of hacker hacks for a different reason, a cause, or both.
Which operating system is best for hacking?
  1. Kali Linux: Developed by Offensive Security as the rewrite of BackTrack, Kali Linux distro tops our list of the best operating systems for hacking purposes.
  2. Parrot Security OS
  3. BackBox
  4. Samurai Web Testing Framework
  5. Pentoo Linux
  6. DEFT Linux
  7. Caine
  8. Network Security Toolkit (NST)
What are the types of cyber attacks?
Let’s examine eight of the most common cyber attacks that your business could face and ways to avoid them.
  • Malware.
  • Phishing.
  • Password Attacks.
  • Denial-of-Service (DoS) Attacks.
  • “Man in the Middle” (MITM)
  • Drive-By Downloads.
  • Malvertising.
  • Rogue Software.

Information Security Interview Questions And Answers

What is a script kitty?
In programming and hacking culture, a script kiddie or skiddie is an unskilled individual who uses scripts or programs developed by others to attack computer systems and networks and deface websites.
What is a blue hat hacker?
A blue hat hacker is someone outside computer security consulting firms who bug tests a system prior to its launch, looking for exploits so they can be closed. Blue Hat Hacker also refers to the security professional invited by Microsoft to find vulnerabilities in Windows.
What is cyber attacks with examples?
A cyberattack is any type of offensive manoeuvre employed by nation-states, individuals, groups, or organizations that targets computer information systems, infrastructures, computer networks, and/or personal computer devices by various means of malicious acts usually originating from an anonymous source.
What are the types of password attacks?
  • Guessing. Simple, repeated attempts using common passwords or known facts about the user.
  • Stealing. Physically or electronically acquiring a users password – can include sniffing of network communications.
  • Dictionary Attack.
  • Brute Force Attack.
  • Rainbow Tables.
  • Hybrid Password Attack.
  • Birthday Attack.
What is a gray hat hacker?
The term “grey hat”, “greyhat” or “gray hat” (gureihato) refers to a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker.
What is a Cyberextortionist?
Cyberextortion is a crime involving an attack or threat of attack coupled with a demand for money to avert or stop the attack. Cyberextortion can take many forms.
What is the white hat hacker?
The term “white hat” in Internet slang refers to an ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies to ensure the security of an organization’s information systems.
What is a brute force hack?
Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted data such as passwords or Data Encryption Standard (DES) keys, through exhaustive effort (using brute force) rather than employing intellectual strategies.
What can an ethical hacker do?
An ethical hacker is a computer and networking expert who systematically attempts to penetrate a computer system or network on behalf of its owners for the purpose of finding security vulnerabilities that a malicious hacker could potentially exploit.

Top Ethical Hacking Interview Questions

What is meant by spoofing attack?
A spoofing attack is when a malicious party impersonates another device or user on a network in order to launch attacks against network hosts, steal data, spread malware or bypass access controls. There are several different types of spoofing attacks that malicious parties can use to accomplish this
.
What are the different types of spoofing?
Types of Spoofing Attacks
ARP Spoofing Attack. The Address Resolution Protocol (ARP) is a protocol used to translate IP addresses into Media Access Control (MAC) addresses in order to be properly transmitted.
DNS Spoofing Attack.
IP Spoofing Attack.

What is difference between sniffing and spoofing?
To start with, there are two common types of Internet security breaches, sniffing and spoofing. *Sniffing is the act of intercepting and inspecting data packets using sniffers (Software or hardware devices) over the Net. On the other hand, *Spoofing is the act of identity impersonation.

What is footprinting in hacking?
Footprinting is the first and most convenient way that hackers use to gather information. about computer systems and the companies they belong to. The purpose of footprinting to. learn as much as you can about a system, it’s remote access capabilities, its ports and. services, and the aspects of its security.

What is footprinting in ethical hacking?
Footprinting (also known as reconnaissance) is the technique used for gathering information about computer systems and the entities they belong to. To get this information, a hacker might use various tools and technologies. This information is very useful to a hacker who is trying to crack a whole system.

What is the difference between phishing and spoofing?
Phishing and spoofing are clearly different beneath the surface. One downloads malware to your computer or network, and the other tricks you into giving up sensitive financial information to a cyber crook. Phishing is a method of retrieval, while spoofing is a means of delivery.

What is reconnaissance in the world of hacking?

The process of collecting information about an intended target of a malicious hack by probing the target system. Active reconnaissance typically involves port scanning in order to find weaknesses in the target system (i.e., which ports are left vulnerable and/or if there are ways around the firewall and routers).

What is active and passive reconnaissance?

Passive reconnaissance is an attempt to gain information about targeted computers and networks without actively engaging with the systems. In active reconnaissance, in contrast, the attacker engages with the target system, typically conducting a port scan to determine find any open ports.

What is enumeration in hacking?

Network enumeration is a computing activity in which usernames and info on groups, shares, and services of networked computers are retrieved. It should not be confused with network mapping, which only retrieves information about which servers are connected to a specific network and what operating system runs on them.

Real-Time Ethical Hacking Scenario Based Interview Questions

What is network enumeration?

Network Enumeration is the discovery of hosts/devices on a network, they tend to use overt discovery protocols such as ICMP and SNMP to gather information, they may also scan various ports on remote hosts for looking for well known services in an attempt to further identify the function of a remote host.

What is a banner grab?

Banner grabbing is a technique used to glean information about a computer system on a network and the services running on its open ports. Administrators can use this to take inventory of the systems and services on their network.

What is operating system fingerprinting?

OS fingerprinting is the process of determining the operating system used by a host on a network.

What is a TCP IP fingerprint?

TCP/IP stack fingerprinting is the passive collection of configuration attributes from a remote device during standard layer 4 network communications. The combination of parameters may then be used to infer the remote machine’s operating system (aka, OS fingerprinting), or incorporated into a device fingerprint.

Why is ethical hacking so important?
As opposed to malicious “black hat” hacking, ethical “white hat” hacking (also called penetration testing) involves using computer hacking skills to identify network security vulnerabilities and patch security holes before anyone can abuse them.

Who are the best hacker in the world today?

Here is the list of top hackers.
  1. Gary McKinnon.
  2. LulzSec.
  3. Adrian Lamo.
  4. Mathew Bevan and Richard Pryce.
  5. Jonathan James.
  6. Kevin Poulsen.
  7. Kevin Mitnick.
  8. Anonymous.

Explain what’s Brute force Hack?
Brute force hack is a technique for hacking password and get get admission to to device and network sources, it takes a lot time, it needs a hacker to study JavaScripts. For this cause, possible use device name “Hydra”.
Explain what’s Sql injection?
Sql is one of the method used to thieve statistics from organizations, it is a fault created in the software code. square injection occurs while you inject the content material into a square query string and the end result mode content into a sq. question string, and the end result modifies the syntax of your question in methods you did now not intend.
Explain what’s network Sniffing?
A community sniffer video display units statistics flowing over pc community hyperlinks. by means of allowing you to seize and look at the packet stage records on your network, sniffer tool can help you to find community troubles. Sniffers can be used for both stealing statistics off a community and additionally for legitimate community control.
Give an explanation for what is Pharming and Defacement?
Pharming: on this method the attacker compromises the DNS ( domain call system) servers or on the person computer in order that site visitors is directed to a malicious website
Defacement: in this technique the attacker replaces the corporation website with a exceptional web page. It includes the hackers name, pictures and may even include messages.
Explain how you can stop your website getting hacked?
By adapting following method you can stop your website from getting hacked
Sanitizing and Validating users parameters: By Sanitizing and Validating user parameters before submitting them to the database can reduce the chances of being attacked by SQL injection
Using Firewall: Firewall can be used to drop traffic from suspicious IP address if attack is a simple DOS
Encrypting the Cookies: Cookie or Session poisoning can be prevented by encrypting the content of the cookies, associating cookies with the client IP address and timing out the cookies after some time
Validating and Verifying user input : This approach is ready to prevent form tempering by verifying and validating the user input before processing it
Validating and Sanitizing headers :  This techniques is useful against cross site scripting or XSS, this technique includes validating and sanitizing headers, parameters passed via the URL, form parameters and hidden values to reduce XSS attacks
Provide an explanation for what is MIB?
MIB ( control records Base ) is a virtual database. It consists of all the formal description about the network gadgets that can be controlled using SNMP. The MIB database is hierarchical and in MIB every controlled objects is addressed via object identifiers (OID).
Provide an explanation for what’s CSRF (cross site Request Forgery)? How you could save you this?
CSRF or pass web site request forgery is an assault from a malicious internet site with the intention to send a request to a web utility that a person is already authenticated against from a one-of-a-kind internet site. To save you CSRF you may append unpredictable mission token to each request and accomplice them with user’s consultation. it’ll ensure the developer that the request obtained is from a legitimate supply.
What are the forms of password cracking techniques?
The styles of password cracking method includes
AttackBrute Forcing
AttacksHybrid
AttackSyllable
AttackRule
What is LDAP ( lightweight listing get right of entry to Protocol ) ?
It is a protocol that is used for getting access to the listing list in the present active directory or also from the alternative listing offerings.






Henry Dalziel
September 3, 2013 at 3:18 pm

Basically the difference is this: HTTP is Hyper Text Transform Protocol and is transmitted over the network via PORT 80 (TCP).

The HTTPS (Hypertext Transfer Protocol over Secure Socket Layer, or HTTP over SSL) is another Web protocol that was originally developed by Netscape and embedded into their browser that enabled encryption and decryption with regards to html page requests.

HTTP uses port 80, HTTPS uses port 443.

In addition, HTTPS/ SSL uses a 40-bit key size for the RC4 stream encryption algorithm, which is considered an adequate degree of encryption for taking credit card payments online.


Jump to
Sections of this page
Accessibility help
Press alt + / to open this menu
Facebook
Email or Phone    Password
       
   
Forgotten account?
Sign Up
See more of Ethical hacking interview questions on Facebook
Log In
or
Create New Account
English (UK) · हिन्दी · اردو · தமிழ் · Español
Privacy · Terms · Advertising · AdChoices
· Cookies ·
More
Facebook © 2018

Ethical hacking interview questions
29 October 2014 ·

1) Explain what is Ethical Hacking?

Ethical Hacking is when a person is allowed to hacks the system with the permission of the product owner to find weakness in a system and later fix them.

2) What is the difference between IP address and Mac address?

IP address: To every device IP address is assigned, so that device can be located on the network. In other words IP address is like your postal address, where anyone who knows your postal address can send you a letter.

MAC (Machine Access Control) address: A MAC address is a unique serial number assigned to every network interface on every device. Mac address is like your physical mail box, only your postal carrier (network router) can identify it and you can change it by getting a new mailbox (network card) at any time and slapping your name (IP address) on it.

3) List out some of the common tools used by Ethical hackers?

Meta Sploit
Wire Shark
NMAP
John The Ripper
Maltego

4) What are the types of ethical hackers?

The types of ethical hackers are

Grey Box hackers or Cyberwarrior
Black Box penetration Testers
White Box penetration Testers
Certified Ethical hacker

5) What is footprinting in ethical hacking? What is the techniques used for footprinting?

Footprinting refers accumulating and uncovering as much as information about the target network before gaining access into any network. The approach adopted by hackers before hacking

Open Source Footprinting : It will look for the contact information of administrators that will be used in guessing the password in Social engineering
Network Enumeration : The hacker tries to identify the domain names and the network blocks of the target network
Scanning : Once the network is known, the second step is to spy the active IP addresses on the network. For identifying active IP addresses (ICMP) Internet Control Message Protocol is an active IP addresses
Stack Fingerprinting : Once the hosts and port have been mapped by scanning the network, the final footprinting step can be performed. This is called Stack fingerprinting.

6937238953_ab83e78554_m

6) Explain what is Brute Force Hack?

Brute force hack is a technique for hacking password and get access to system and network resources, it takes much time, it needs a hacker to learn about JavaScripts. For this purpose, one can use tool name “Hydra”.

7) Explain what is DOS (Denial of service) attack? What are the common forms of DOS attack?

Denial of Service, is a malicious attack on network that is done by flooding the network with useless traffic. Although, DOS does not cause any theft of information or security breach, it can cost the website owner a great deal of money and time.

Buffer Overflow Attacks
SYN Attack
Teardrop Attack
Smurf Attack
Viruses

8) Explain what is SQL injection?

SQL is one of the technique used to steal data from organizations, it is a fault created in the application code. SQL injection happens when you inject the content into a SQL query string and the result mode content into a SQL query string, and the result modifies the syntax of your query in ways you did not intend

9) What are the types of computer based social engineering attacks? Explain what is Phishing?

Computer based social engineering attacks are

Phishing
Baiting
On-line scams

Phishing technique involves sending false e-mails, chats or website to impersonate real system with aim of stealing information from original website.

10) Explain what is Network Sniffing?

A network sniffer monitors data flowing over computer network links. By allowing you to capture and view the packet level data on your network, sniffer tool can help you to locate network problems. Sniffers can be used for both stealing information off a network and also for legitimate network management.

11) Explain what is ARP Spoofing or ARP poisoning?

ARP (Address Resolution Protocol) is a form of attack in which an attacker changes MAC ( Media Access Control) address and attacks an internet LAN by changing the target computer’s ARP cache with a forged ARP request and reply packets.

12) How you can avoid or prevent ARP poisoning?

ARP poisoning can be prevented by following methods

Packet Filtering : Packet filters are capable for filtering out and blocking packets with conflicting source address information
Avoid trust relationship : Organization should develop protocol that rely on trust relationship as little as possible
Use ARP spoofing detection software : There are programs that inspects and certifies data before it is transmitted and blocks data that is spoofed
Use cryptographic network protocols : By using secure communications protocols like TLS, SSH, HTTP secure prevents ARP spoofing attack by encrypting data prior to transmission and authenticating data when it is received

13) What is Mac Flooding?

Mac Flooding is a technique where the security of given network switch is compromised. In Mac flooding the hacker or attacker floods the switch with large number of frames, then what a switch can handle. This make switch behaving as a hub and transmits all packets at all the ports. Taking the advantage of this the attacker will try to send his packet inside the network to steal the sensitive information.

14) Explain what is DHCP Rogue Server?

A Rogue DHCP server is DHCP server on a network which is not under the control of administration of network staff. Rogue DHCP Server can be a router or modem. It will offer users IP addresses , default gateway, WINS servers as soon as user’s logged in. Rogue server can sniff into all the traffic sent by client to all other networks.

15) Explain what is Cross-site scripting and what are the types of Cross site scripting?

Cross site scripting is done by using the known vulnerabilities like web based applications, their servers or plug-ins users rely upon. Exploiting one of these by inserting malicious coding into a link which appears to be a trustworthy source. When users click on this link the malicious code will run as a part of the client’s web request and execute on the user’s computer, allowing attacker to steal information.

There are three types of Cross-site scripting

Non-persistent
Persistent
Server side versus DOM based vulnerabilities

16) Explain what is Burp Suite, what are the tools it consist of?

Burp suite is an integrated platform used for attacking web applications. It consists of all the Burp tools required for attacking an application. Burp Suite tool has same approach for attacking web applications like framework for handling HTTP request, upstream proxies, alerting, logging and so on.

The tools that Burp Suite has

Proxy
Spider
Scanner
Intruder
Repeater
Decoder
Comparer
Sequencer

17) Explain what is Pharming and Defacement?

Pharming: In this technique the attacker compromises the DNS ( Domain Name System) servers or on the user computer so that traffic is directed to a malicious site
Defacement: In this technique the attacker replaces the organization website with a different page. It contains the hackers name, images and may even include messages and background music

18) Explain how you can stop your website getting hacked?

By adapting following method you can stop your website from getting hacked

Sanitizing and Validating users parameters: By Sanitizing and Validating user parameters before submitting them to the database can reduce the chances of being attacked by SQL injection
Using Firewall: Firewall can be used to drop traffic from suspicious IP address if attack is a simple DOS
Encrypting the Cookies: Cookie or Session poisoning can be prevented by encrypting the content of the cookies, associating cookies with the client IP address and timing out the cookies after some time
Validating and Verifying user input : This approach is ready to prevent form tempering by verifying and validating the user input before processing it
Validating and Sanitizing headers : This techniques is useful against cross site scripting or XSS, this technique includes validating and sanitizing headers, parameters passed via the URL, form parameters and hidden values to reduce XSS attacks

19) Explain what is Keylogger Trojan?

Keylogger Trojan is malicious software that can monitor your keystroke, logging them to a file and sending them off to remote attackers. When the desired behaviour is observed, it will record the keystroke and captures your login username and password.

20) Explain what is Enumeration?

The process of extracting machine name, user names, network resources, shares and services from a system. Under Intranet environment enumeration techniques are conducted.

21) Explain what is NTP?

To synchronize clocks of networked computers, NTP (Network Time Protocol) is used. For its primary means of communication UDP port 123 is used. Over the public internet NTP can maintain time to within 10 milliseconds

22) Explain what is MIB?

MIB ( Management Information Base ) is a virtual database. It contains all the formal description about the network objects that can be managed using SNMP. The MIB database is hierarchical and in MIB each managed objects is addressed through object identifiers (OID).

23) Mention what are the types of password cracking techniques?

The types of password cracking technique includes

AttackBrute Forcing
AttacksHybrid
AttackSyllable
AttackRule

24) Explain what are the types of hacking stages?

The types of hacking stages are

Gaining AccessEscalating
PrivilegesExecuting
ApplicationsHiding
FilesCovering Tracks

25) Explain what is CSRF (Cross Site Request Forgery)? How you can prevent this?

CSRF or Cross site request forgery is an attack from a malicious website that will send a request to a web application that a user is already authenticated against from a different website. To prevent CSRF you can append unpredictable challenge token to each request and associate them with user’s session. It will ensure the developer that the request received is from a valid source.

 
























Comments

Popular posts from this blog

Siem architecture

ESXI REMOVE ALL SNAPSHOTS HANGS AT 99%

SharesFacebookTwitterGoogle+PinterestEmailSumoMe VMware ESX – “Unable to access a file since it is locked