Latest Certified Success Dumps Download

CISCO, MICROSOFT, COMPTIA, HP, IBM, ORACLE, VMWARE
312-50 Latest Exam (Sep 2017)

[Free] 2017(Sep) EnsurePass Testinsides ECCouncil 312-50 Dumps with VCE and PDF 341-350

September 22, 2017

EnsurePass
2017 Sep ECCouncil Official New Released 312-50
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/312-50.html

Ethical Hacking and Countermeasures

Question No: 341 – (Topic 11)

000 00 00 BA 5E BA 11 00 A0 C9 B0 5E BD 08 00 45 00 …^……^…E.

010 05 DC 1D E4 40 00 7F 06 C2 6D 0A 00 00 02 0A 00 ….@….m……

020 01 C9 00 50 07 75 05 D0 00 C0 04 AE 7D F5 50 10 …P.u……}.P.

030 70 79 8F 27 00 00 48 54 54 50 2F 31 2E 31 20 32 py.#39;..HTTP/1.1.2

040 30 30 20 4F 4B 0D 0A 56 69 61 3A 20 31 2E 30 20 00.OK..Via:.1.0.

050 53 54 52 49 44 45 52 0D 0A 50 72 6F 78 79 2D 43 STRIDER..Proxy-C

060 6F 6E 6E 65 63 74 69 6F 6E 3A 20 4B 65 65 70 2D onnection:.Keep-

070 41 6C 69 76 65 0D 0A 43 6F 6E 74 65 6E 74 2D 4C Alive..Content-L

080 65 6E 67 74 68 3A 20 32 39 36 37 34 0D 0A 43 6F ength:.29674..Co

090 6E 74 65 6E 74 2D 54 79 70 65 3A 20 74 65 78 74 ntent-Type:.text

0A0 2F 68 74 6D 6C 0D 0A 53 65 72 76 65 72 3A 20 4D /html..Server:.

0B0 69 63 72 6F 73 6F 66 74 2D 49 49 53 2F 34 2E 30 ..Microsoft

0C0 0D 0A 44 61 74 65 3A 20 53 75 6E 2C 20 32 35 20 ..Date:.Sun,.25.

0D0 4A 75 6C 20 31 39 39 39 20 32 31 3A 34 35 3A 35 Jul.1999.21:45:5

0E0 31 20 47 4D 54 0D 0A 41 63 63 65 70 74 2D 52 61 1.GMT..Accept-Ra

0F0 6E 67 65 73 3A 20 62 79 74 65 73 0D 0A 4C 61 73 nges:.bytes..Las

100 74 2D 4D 6F 64 69 66 69 65 64 3A 20 4D 6F 6E 2C t-Modified:.Mon,

110 20 31 39 20 4A 75 6C 20 31 39 39 39 20 30 37 3A .19.Jul.1999.07:

120 33 39 3A 32 36 20 47 4D 54 0D 0A 45 54 61 67 3A 39:26.GMT..ETag:

130 20 22 30 38 62 37 38 64 33 62 39 64 31 62 65 31 .quot;08b78d3b9d1be1

140 3A 61 34 61 22 0D 0A 0D 0A 3C 74 69 74 6C 65 3E :a4aquot;….lt;titlegt;

150 53 6E 69 66 66 69 6E 67 20 28 6E 65 74 77 6F 72 Sniffing.(networ

160 6B 20 77 69 72 65 74 61 70 2C 20 73 6E 69 66 66 k.wiretap,.sniff

170 65 72 29 20 46 41 51 3C 2F 74 69 74 6C 65 3E 0D er).FAQlt;/titlegt;.

180 0A 0D 0A 3C 68 31 3E 53 6E 69 66 66 69 6E 67 20 …lt;h1gt;Sniffing.

190 28 6E 65 74 77 6F 72 6B 20 77 69 72 65 74 61 70 (network.wiretap

1A0 2C 20 73 6E 69 66 66 65 72 29 20 46 41 51 3C 2F ,.sniffer).FAQlt;/

1B0 68 31 3E 0D 0A 0D 0A 54 68 69 73 20 64 6F 63 75 h1gt;….This.docu

1C0 6D 65 6E 74 20 61 6E 73 77 65 72 73 20 71 75 65 ment.answers.que

1D0 73 74 69 6F 6E 73 20 61 62 6F 75 74 20 74 61 70 stions.about.tap

1E0 70 69 6E 67 20 69 6E 74 6F 20 0D 0A 63 6F 6D 70 ping.into…comp

1F0 75 74 65 72 20 6E 65 74 77 6F 72 6B 73 20 61 6E uter.networks.an

This packet was taken from a packet sniffer that monitors a Web server.

This packet was originally 1514 bytes long, but only the first 512 bytes are shown here. This is the standard hexdump representation of a network packet, before being decoded. A hexdump has three columns: the offset of each line, the hexadecimal data, and the ASCII equivalent. This packet contains a 14-byte Ethernet header, a 20- byte IP header, a 20-byte TCP header, an HTTP header ending in two line-feeds (0D 0A 0D 0A) and then the data. By examining the packet identify the name and version of the Web server?

  1. Apache 1.2

  2. IIS 4.0

  3. IIS 5.0

  4. Linux WServer 2.3

Answer: B Explanation:

We see that the server is Microsoft, but the exam designer didn’t want to make it easy for you. So what they did is blank out the IIS 4.0. The key is in line “0B0” as you see:

0B0 69 63 72 6F 73 6F 66 74 2D 49 49 53 2F 34 2E 30 ..Microsoft

49 is I, so we get II 53 is S, so we get IIS 2F is a space

34 is 4 2E is . 30 is 0

So we get IIS 4.0

The answer is B

If you don’t remember the ASCII hex to Character, there are enough characters and numbers already converted. For example, line “050” has STRIDER which is 53 54 52 49 44 45 52 and gives you the conversion for the “I:” and “S” characters (which is “49” and “53”).

Question No: 342 – (Topic 11)

Bill has successfully executed a buffer overflow against a Windows IIS web server. He has been able to spawn an interactive shell and plans to deface the main web page. He first attempts to use the quot;echoquot; command to simply overwrite index.html and remains unsuccessful. He then attempts to delete the page and achieves no progress. Finally, he tries to overwrite it with another page in which also he remains unsuccessful. What is the probable cause of Bill#39;s problem?

  1. You cannot use a buffer overflow to deface a web page

  2. There is a problem with the shell and he needs to run the attack again

  3. The HTML file has permissions of read only

  4. The system is a honeypot

Answer: C

Question No: 343 – (Topic 11)

What is Form Scalpel used for?

  1. Dissecting HTML Forms

  2. Dissecting SQL Forms

  3. Analysis of Access Database Forms

  4. Troubleshooting Netscape Navigator

  5. Quatro Pro Analysis Tool

Answer: A

Explanation: Form Scalpel automatically extracts forms from a given web page and splits up all fields for editing and manipulation.

Question No: 344 – (Topic 11)

Data is sent over the network as clear text (unencrypted) when Basic Authentication is configured on Web Servers.

  1. True

  2. False

Answer: A

Explanation: Using HTTP basic authentication will result in your password being sent over the internet as clear text. Don#39;t use this technique unless you understand what the ramifications of this are.

Question No: 345 – (Topic 11)

This kind of attack will let you assume a users identity at a dynamically generated web page or site:

  1. SQL Injection

  2. Cross Site Scripting

  3. Session Hijacking

  4. Zone Transfer

Answer: B

Explanation: Cross-site scripting (XSS) is a type of computer security vulnerability typically

found in web applications which allow code injection by malicious web users into the web pages viewed by other users. Examples of such code include HTML code and client-side scripts. An exploited cross-site scripting vulnerability can be used by attackers to bypass access controls such as the same origin policy.

Question No: 346 – (Topic 11)

On a default installation of Microsoft IIS web server, under which privilege does the web server software execute?

  1. Everyone

  2. Guest

  3. System

  4. Administrator

Answer: C

Explanation: If not changed during the installation, IIS will execute as Local System with way to high privileges.

Question No: 347 – (Topic 11)

Sara is making use of Digest Authentication for her Web site. Why is this considered to be more secure than Basic authentication?

  1. Basic authentication is broken

  2. The password is never sent in clear text over the network

  3. The password sent in clear text over the network is never reused.

  4. It is based on Kerberos authentication protocol

Answer: B

Explanation: Digest access authentication is one of the agreed methods a web page can use to negotiate credentials with a web user (using the HTTP protocol). This method builds upon (and obsoletes) the basic authentication scheme, allowing user identity to be established without having to send a password in plaintext over the network.

Question No: 348 – (Topic 11)

will let you assume a users identity at a dynamically generated web page or site.

  1. SQL attack

  2. Injection attack

  3. Cross site scripting

  4. The shell attack

  5. Winzapper

Answer: C

Explanation: Cross site scripting is also referred to as XSS or CSS. You must know the user is online and you must scam that user into clicking on a link that you have sent in order for this hack attack to work.

Question No: 349 – (Topic 11)

You wish to determine the operating system and type of web server being used. At the same time you wish to arouse no suspicion within the target organization.

While some of the methods listed below work, which holds the least risk of detection?

  1. Make some phone calls and attempt to retrieve the information using social engineering.

  2. Use nmap in paranoid mode and scan the web server.

  3. Telnet to the web server and issue commands to illicit a response.

  4. Use the netcraft web site look for the target organization’s web site.

Answer: D

Explanation: Netcraft is providing research data and analysis on many aspects of the Internet. Netcraft has explored the Internet since 1995 and is a respected authority on the market share of web servers, operating systems, hosting providers, ISPs, encrypted transactions, electronic commerce, scripting languages and content technologies on the internet.

Question No: 350 – (Topic 11)

Bill successfully executed a buffer overflow against a Windows IIS web server. He has been able to spawn in interactive shell and plans to deface the main web page. He fist attempts to use the “Echo” command to simply overwrite index.html and remains unsuccessful. He then attempts to delete the page and achieves no progress. Finally, he tires to overwrite it with another page in which also he remains unsuccessful. What is the probable cause of Bill’s problem?

  1. The system is a honeypot

  2. The HTML file has permissions of read only

  3. You can’t use a buffer overflow to deface a web page

  4. There is a problem with the shell and he needs to run the attack again

Answer: B

Explanation: A honeypot has no interest in stopping an intruder from altering the “target” files. A buffer overflow is a way to gain access to the target computer. Once he has spawned a shell it is unlikely that it will not work as intended, but the user context that the shell is spawned in might stop him from altering the index.html file incase he doesn’t have sufficient rights.

100% Free Download!
Download Free Demo:312-50 Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass 312-50 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE