Vous êtes sur la page 1sur 3

Kindly explain procedure of removing trojan manually from computer if it is FUD?

What is the use of MALTEGO too

Name any two websites to check your global IP address State the difference between Local IP & External Ip? Why hacker maintain an access to website after gaining an access? Difference between zero day vulnerability and zero day exploit?

What are the common defenses against XSS?

Suppose a scenario, a HTTPS connection is established between server and client side, all the data that passed through are encrypted. Now we set a proxy(say bur p suite) behind the browser, Now we send a request from browser to server, but w e found the data is in cleartext format.how is that possible?

What is Http only flag, how could it be bypass?

How would you perform a SQL Injection on a website if the value you are selectin g/entering isn't being showed in the URL. ? Kindly name 2-3 crypter applications which can be used to make trojan FUD(Fully Undetectable)?

Can the ip=172.16.31.5 communcate with 122.168.12.25 directly,if yes then tell h ow or if not then tell why? Explain Md5, Sha1, NT,NTLM?

While adding ' after id=10 in one website i am getting following error.. The Fol lowing query is not properly executed: {SELECT * FROM ads1 where nAddsID=21529\\ \'} You have an error in your SQL syntax; check the manual that corresponds to y our MySQL server version for the right syntax to use near '\\\'' at line 1.. whi ch vulnerability

If you will have to both encrypt and compress data during transmission, which da ta will process first, and why?

Suppose you are having a website , lets say techdefence.com . Website is hosted on a dedicated server. How will you identify that, how many http methods are ena ble on the server? Firewall Protects website and database" is this sentence correct? What is Kerberos? how can we change the mac address of windows nic card or linux manually without any tool? Explain in details how does HTTPs secure the website? and also explain how HTTPs helps hacker to hack website securely? Can you tell me, any high severity vulnerability in below web application http:/ /crackme.cenzic.com/Kelev/view/home.php The following illustrates a transactional web application.Can you find out the p roblem with it? Account C has 100 credits. Account D has 100 credits. Both User 1 and User 2 want to transfer 10 credits from Account C to Account D. If the tra nsaction was correct the outcome should be: Account C has 80 credits. Account D has 120 credits. However, due to some issues, the following result could be obta ined: User 1 checks the value of Account C (=100 credits) User 2 checks the valu e of Account C (=100 credits) User 2 takes 10 credits from Account C (=90 credit s) and put it in Account D (=110 credits) User 1 takes 10 credits from Account C (Still believed to contain 100 credits) (=90 credits) and puts it into Account D (=120 credits). Result: Account C has 90 credits Account D has 120 credits

Whats the difference between encoding, encryption? Suppose you are having a website , lets say techdefence.com . Website is hosted on a dedicated server. How will you find out other website on the same server? How do we get the username and password, using Phishing, if we don't want the vi ctim to go to our fake login page as soon as he types in the URL. ? Kindly name this method too. Kindly explain why firewall can not protect web server and database? What type of vulnerability is present if you're able to perform some of the java

script commands through a search box. Explain the diffrence between Basic Access Authentication and Digest Access Auth entication with an example?

Vous aimerez peut-être aussi