Advance Security Lab at University Of Mumbai | Flashcards & Summaries

Select your language

Suggested languages for you:
Log In Start studying!

Lernmaterialien für advance security lab an der University of Mumbai

Greife auf kostenlose Karteikarten, Zusammenfassungen, Übungsaufgaben und Altklausuren für deinen advance security lab Kurs an der University of Mumbai zu.

TESTE DEIN WISSEN
Kali Linux
Lösung anzeigen
TESTE DEIN WISSEN
Kali Linux is a specially designed OS for network analysts, Penetration testers, or in simple words, it is for those who work under the umbrella of cybersecurity and analysis.
Lösung ausblenden
TESTE DEIN WISSEN
Kali Linux in-built tools
Lösung anzeigen
TESTE DEIN WISSEN
Sometimes we have to automate our tasks while performing penetration testing or hacking as there could be thousands of conditions and payloads to test and testing them manually is a difficult task, So to increase the time efficiency we use tools that come pre-packed with Kali Linux. These tools not only saves our time but also captures the accurate data and output the specific result. Kali Linux comes packed with more than 350 tools which could be useful for hacking or penetration testing.

1. Nmap
Nmap is an open-source network scanner that is used to recon/scan networks. It is used to discover hosts, ports, and services along with their versions over a network. It sends packets to the host and then analyzes the responses in order to produce the desired results.

2. Burp Suite
Burp Suite is one of the most popular web application security testing software. It is used as a proxy, so all the requests from the browser with the proxy pass through it. And as the request passes through the burp suite, it allows us to make changes to those requests as per our need which is good for testing vulnerabilities

3. Wireshark
Wireshark is a network security tool used to analyze or work with data sent over a network. It is used to analyze the packets transmitted over a network. These packets may have information like the source IP and the destination IP, the protocol used, the data, and some headers

4. metasploit Framework
 It comes packed with a lot of exploits to exploit the vulnerabilities over a network or operating systems.

5. aircrack-ng
Aircrack is an all in one packet sniffer, WEP and WPA/WPA2 cracker, analyzing tool and a hash capturing tool

6. Netcat

Netcat is a networking tool used to work with ports and performing actions like port scanning, port listening, or port redirection

7. John the Ripper
John the Ripper is a great tool for cracking passwords using some famous brute for attacks

8. sqlmap
sqlmap is one of the best tools to perform SQL injection attacks

9. Autopsy
Autopsy is a digital forensics tool that is used to gather the information form forensics

10. Social Engineering Toolkit
Social Engineering Toolkit is a collection of tools that could be used to perform social engineering attacks
Lösung ausblenden
TESTE DEIN WISSEN
Explore forensics tools in Kali Linux for acquiring, analyzing and duplicating data.
Lösung anzeigen
TESTE DEIN WISSEN
Binwalk
Bulk-Extractor. ...
p0f. ...
Autopsy. ...
John the Ripper

Lösung ausblenden
TESTE DEIN WISSEN
Implementation and analysis of SQL injection Attack
Lösung anzeigen
TESTE DEIN WISSEN
It is a source code injection in which malicious SQL statements are inserted into entry field of a database to dump database content
Lösung ausblenden
TESTE DEIN WISSEN
Implementation of Buffer overflow attack and its analysis using Splint, Cppcheck etc.
Lösung anzeigen
TESTE DEIN WISSEN
It is where process stores data in buffer that overruns the boundary and overwrites adjacent memory locations
It can be triggered by inputs that are designed to execute code or alter the way the program operates
Bound check can prevent buffer overflow
Lösung ausblenden
TESTE DEIN WISSEN
What is a Firewall?
Lösung anzeigen
TESTE DEIN WISSEN
Firewall is a network security system that filters and controls the traffic on a predetermined set of rules. This is an intermediary system between the device and the internet.
Lösung ausblenden
TESTE DEIN WISSEN
How to setup firewall using iptables
Lösung anzeigen
TESTE DEIN WISSEN
IPTables” the default tool provided in Linux to establish a firewall. Iptables is used to set up, maintain and inspect the tables of the IPv4 and IPv6 packet filter rules in the Linux Kernel. 
Lösung ausblenden
TESTE DEIN WISSEN
Kismet
Lösung anzeigen
TESTE DEIN WISSEN
Kismet is a network detector, packet sniffer, and intrusion detection system for 802.11 wireless LANs. Kismet will work with any wireless card which supports raw monitoring mode, and can sniff 802.11a, 802.11b, 802.11g, and 802.11n traffic.
Lösung ausblenden
TESTE DEIN WISSEN
Netstumbler
Lösung anzeigen
TESTE DEIN WISSEN
NetStumbler is a tool for Windows that facilitates detection of Wireless LANs using the 802.11b, 802.11a and 802.11g WLAN standards. NetStumbler is a program that needs less storage than the average program in the category Networking software
Lösung ausblenden
TESTE DEIN WISSEN
Wireshark
Lösung anzeigen
TESTE DEIN WISSEN
Wireshark is the world’s foremost and widely-used network protocol analyzer. It lets you see what’s happening on your network at a microscopic level and is the de facto (and often de jure) standard across many commercial and non-profit enterprises, government agencies, and educational institutions
Wireshark is a packet sniffer and analysis tool. It captures network traffic on the local network and stores that data for offline analysis. Wireshark captures network traffic from Ethernet, Bluetooth, Wireless (IEEE. 802.11), Token Ring, Frame Relay connections, and more.18
Lösung ausblenden
TESTE DEIN WISSEN
Exploring Router security, access lists using packet tracer.
Lösung anzeigen
TESTE DEIN WISSEN
Access control lists (ACLs) perform packet filtering to control the movement of packets through a network. Packet filtering provides security by limiting the access of traffic into a network, restricting user and device access to a network, and preventing traffic from leaving a network. IP access lists reduce the chance of spoofing and denial-of-service attacks, and allow dynamic, temporary user-access through a firewall.
Lösung ausblenden
TESTE DEIN WISSEN
RADIUS
Lösung anzeigen
TESTE DEIN WISSEN
RADIUS (Remote Authentication Dial-In User Service) is a client-server protocol and software that enables remote access servers to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or service.

RADIUS enables a company to maintain user profiles in a central database that all remote servers can share. Having a central database provides better security, enabling a company to set up a policy that can be applied at a single administered network point. A central database also makes it easier to track usage for billing for the network access or internet service provider and for keeping network statistics
Lösung ausblenden
  • 2003 Karteikarten
  • 542 Studierende
  • 2 Lernmaterialien

Beispielhafte Karteikarten für deinen advance security lab Kurs an der University of Mumbai - von Kommilitonen auf StudySmarter erstellt!

Q:
Kali Linux
A:
Kali Linux is a specially designed OS for network analysts, Penetration testers, or in simple words, it is for those who work under the umbrella of cybersecurity and analysis.
Q:
Kali Linux in-built tools
A:
Sometimes we have to automate our tasks while performing penetration testing or hacking as there could be thousands of conditions and payloads to test and testing them manually is a difficult task, So to increase the time efficiency we use tools that come pre-packed with Kali Linux. These tools not only saves our time but also captures the accurate data and output the specific result. Kali Linux comes packed with more than 350 tools which could be useful for hacking or penetration testing.

1. Nmap
Nmap is an open-source network scanner that is used to recon/scan networks. It is used to discover hosts, ports, and services along with their versions over a network. It sends packets to the host and then analyzes the responses in order to produce the desired results.

2. Burp Suite
Burp Suite is one of the most popular web application security testing software. It is used as a proxy, so all the requests from the browser with the proxy pass through it. And as the request passes through the burp suite, it allows us to make changes to those requests as per our need which is good for testing vulnerabilities

3. Wireshark
Wireshark is a network security tool used to analyze or work with data sent over a network. It is used to analyze the packets transmitted over a network. These packets may have information like the source IP and the destination IP, the protocol used, the data, and some headers

4. metasploit Framework
 It comes packed with a lot of exploits to exploit the vulnerabilities over a network or operating systems.

5. aircrack-ng
Aircrack is an all in one packet sniffer, WEP and WPA/WPA2 cracker, analyzing tool and a hash capturing tool

6. Netcat

Netcat is a networking tool used to work with ports and performing actions like port scanning, port listening, or port redirection

7. John the Ripper
John the Ripper is a great tool for cracking passwords using some famous brute for attacks

8. sqlmap
sqlmap is one of the best tools to perform SQL injection attacks

9. Autopsy
Autopsy is a digital forensics tool that is used to gather the information form forensics

10. Social Engineering Toolkit
Social Engineering Toolkit is a collection of tools that could be used to perform social engineering attacks
Q:
Explore forensics tools in Kali Linux for acquiring, analyzing and duplicating data.
A:
Binwalk
Bulk-Extractor. ...
p0f. ...
Autopsy. ...
John the Ripper

Q:
Implementation and analysis of SQL injection Attack
A:
It is a source code injection in which malicious SQL statements are inserted into entry field of a database to dump database content
Q:
Implementation of Buffer overflow attack and its analysis using Splint, Cppcheck etc.
A:
It is where process stores data in buffer that overruns the boundary and overwrites adjacent memory locations
It can be triggered by inputs that are designed to execute code or alter the way the program operates
Bound check can prevent buffer overflow
Mehr Karteikarten anzeigen
Q:
What is a Firewall?
A:
Firewall is a network security system that filters and controls the traffic on a predetermined set of rules. This is an intermediary system between the device and the internet.
Q:
How to setup firewall using iptables
A:
IPTables” the default tool provided in Linux to establish a firewall. Iptables is used to set up, maintain and inspect the tables of the IPv4 and IPv6 packet filter rules in the Linux Kernel. 
Q:
Kismet
A:
Kismet is a network detector, packet sniffer, and intrusion detection system for 802.11 wireless LANs. Kismet will work with any wireless card which supports raw monitoring mode, and can sniff 802.11a, 802.11b, 802.11g, and 802.11n traffic.
Q:
Netstumbler
A:
NetStumbler is a tool for Windows that facilitates detection of Wireless LANs using the 802.11b, 802.11a and 802.11g WLAN standards. NetStumbler is a program that needs less storage than the average program in the category Networking software
Q:
Wireshark
A:
Wireshark is the world’s foremost and widely-used network protocol analyzer. It lets you see what’s happening on your network at a microscopic level and is the de facto (and often de jure) standard across many commercial and non-profit enterprises, government agencies, and educational institutions
Wireshark is a packet sniffer and analysis tool. It captures network traffic on the local network and stores that data for offline analysis. Wireshark captures network traffic from Ethernet, Bluetooth, Wireless (IEEE. 802.11), Token Ring, Frame Relay connections, and more.18
Q:
Exploring Router security, access lists using packet tracer.
A:
Access control lists (ACLs) perform packet filtering to control the movement of packets through a network. Packet filtering provides security by limiting the access of traffic into a network, restricting user and device access to a network, and preventing traffic from leaving a network. IP access lists reduce the chance of spoofing and denial-of-service attacks, and allow dynamic, temporary user-access through a firewall.
Q:
RADIUS
A:
RADIUS (Remote Authentication Dial-In User Service) is a client-server protocol and software that enables remote access servers to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or service.

RADIUS enables a company to maintain user profiles in a central database that all remote servers can share. Having a central database provides better security, enabling a company to set up a policy that can be applied at a single administered network point. A central database also makes it easier to track usage for billing for the network access or internet service provider and for keeping network statistics
advance security lab

Erstelle und finde Lernmaterialien auf StudySmarter.

Greife kostenlos auf tausende geteilte Karteikarten, Zusammenfassungen, Altklausuren und mehr zu.

Jetzt loslegen

Das sind die beliebtesten advance security lab Kurse im gesamten StudySmarter Universum

IT-Security

ZHAW - Zürcher Hochschule für Angewandte Wissenschaften

Zum Kurs
Safety and Security

De Haagse Hogeschool

Zum Kurs
Advanced Network Security

Jordan University of Science and Technology

Zum Kurs
IT-Security

Fachhochschule der Wirtschaft

Zum Kurs

Die all-in-one Lernapp für Studierende

Greife auf Millionen geteilter Lernmaterialien der StudySmarter Community zu
Kostenlos anmelden advance security lab
Erstelle Karteikarten und Zusammenfassungen mit den StudySmarter Tools
Kostenlos loslegen advance security lab