lab 28 Flashcards

1
Q

When the Burp Suite’s Intercept function is turned off, what is the tool doing?

Session hijacking
AitM sniffing
Credential cracking
Cookie theft
Session ID abuse

A

AitM sniffing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What was the purpose of changing the proxy settings on the victim?

To prevent encryption negotiation
To route traffic to the attacker’s system
To disable the firewall
To enable DNS resolution

A

To route traffic to the attacker’s system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What would stop the victim’s credentials from being stolen in the AitM attack? (select two)

SPAM filter
Encrypted protocols
Firewall
Not trusting unsolicited instructions
Intrusion detection system

A

Encrypted protocols
Not trusting unsolicited instructions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the HTTP method of communication that contained the victim’s credentials in the AitM attack?

GET
HEAD
PUT
POST

A

POST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following concepts should be added to the user training at the organization to avoid this type of scam in the future?

Do not execute scripts offered via email

Do not use company credentials anywhere other than valid internal systems
Log out of system when not in use

Be cautious about instructions provided over the phone

Do not share your credentials with others

A

Do not execute scripts offered via email

Do not use company credentials anywhere other than valid internal systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly