O'Reilly logo

Penetration Testing: Protecting Networks and Systems by Kevin M. Henry

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

ADDITIONAL QUESTIONS AND ANSWERS

1. Why wouldn’t it be surprising to find Netcat on a Trojaned computer?

a) Netcat can be used to block any port from proper operation.

b) Netcat is used by system administrators to detect remote access Trojans.

c) Netcat can be used to perform port scanning.

d) Netcat encrypts all communications.

2. Why is tunneling-based Trojan software so useful for hackers if it is installed inside a corporate network?

a) Tunneling software uses ports that are not well known, e.g. 12345.

b) Stateful inspection firewalls can only filter server ports of 1-1023.

c) It makes network penetration trivial – the tunneling occurs using whichever port(s) the firewall is configured to allow.

d) Anti-Trojan software does not have signatures ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required