Question 116

You work as a professional Ethical Hacker. You are assigned a project to test the security of www.weare- secure.com. You somehow enter in we-are-secure Inc. main server, which is Windows based.
While you are installing the NetCat tool as a backdoor in the we-are-secure server, you see the file credit.dat having the list of credit card numbers of the company's employees. You want to transfer the credit.dat file in your local computer so that you can sell that information on the internet in the good price. However, you do not want to send the contents of this file in the clear text format since you do not want that the Network Administrator of the we-are-secure Inc. can get any clue of the hacking attempt. Hence, you decide to send the content of the credit.dat file in the encrypted format.
What steps should you take to accomplish the task?
  • Question 117

    Which of the following statements is true about a Trojan engine?
  • Question 118

    John works as a C programmer. He develops the following C program:
    #include <stdlib.h>
    #include <stdio.h>
    #include <string.h>
    int buffer(char *str) {
    char buffer1[10];
    strcpy(buffer1, str);
    return 1;
    }
    int main(int argc, char *argv[]) {
    buffer (argv[1]);
    printf("Executed\n");
    return 1;
    }
    His program is vulnerable to a __________ attack.
  • Question 119

    You want to measure the number of heaps used and overflows occurred at a point in time. Which of the following commands will you run to activate the appropriate monitor?
  • Question 120

    Your IDS discovers that an intruder has gained access to your system. You immediately stop that access, change
    passwords for administrative accounts, and secure your network. You discover an odd account (not administrative)
    that has permission to remotely access the network. What is this most likely?