lab 28 Flashcards
When the Burp Suite’s Intercept function is turned off, what is the tool doing?
Session hijacking
AitM sniffing
Credential cracking
Cookie theft
Session ID abuse
AitM sniffing
What was the purpose of changing the proxy settings on the victim?
To prevent encryption negotiation
To route traffic to the attacker’s system
To disable the firewall
To enable DNS resolution
To route traffic to the attacker’s system
What would stop the victim’s credentials from being stolen in the AitM attack? (select two)
SPAM filter
Encrypted protocols
Firewall
Not trusting unsolicited instructions
Intrusion detection system
Encrypted protocols
Not trusting unsolicited instructions
What is the HTTP method of communication that contained the victim’s credentials in the AitM attack?
GET
HEAD
PUT
POST
POST
Which of the following concepts should be added to the user training at the organization to avoid this type of scam in the future?
Do not execute scripts offered via email
Do not use company credentials anywhere other than valid internal systems
Log out of system when not in use
Be cautious about instructions provided over the phone
Do not share your credentials with others
Do not execute scripts offered via email
Do not use company credentials anywhere other than valid internal systems