Question: 1
To what does ''message repudiation'' refer to what concept in the realm of email security?
Question: 2
Eve is spending her day scanning the library computers. She notices that Alice is using a computer whose port 445 is active and listening. Eve uses the ENUM tool to enumerate Alice machine. From the command prompt, she types the following command.
For /f "tokens=1 %%a in (hackfile.txt) do net use * \\10.1.2.3\c$ /user:"Administrator" %%a
What is Eve trying to do?
Question: 3
What file system vulnerability does the following command take advantage of?
type c:\anyfile.exe > c:\winnt\system32\calc.exe:anyfile.exe
Question: 4
Exhibit:
ettercap --NCLzs --quiet
What does the command in the exhibit do in ''Ettercap''?
Question: 5
Exhibit:
You are conducting pen-test against a company's website using SQL Injection techniques. You enter ''anuthing or 1=1-'' in the username filed of an authentication form. This is the output returned from the server. What is the next step you should do?