Unit5 - Subjective Questions

INT245 • Practice Questions with Detailed Answers

1

Explain the concept of System Hacking. What are the primary goals and the four main methodology steps involved in this phase of penetration testing?

2

Compare and contrast Dictionary Attacks, Brute-Force Attacks, and Rainbow Table Attacks in the context of password cracking.

3

Explain the mathematical concept of Salting in password storage and how it mitigates pre-computation attacks like Rainbow Tables.

4

Describe the Unquoted Service Path vulnerability in Windows and how it can be used for Privilege Escalation.

5

What are SUID (Set User ID) permissions in Linux? How can a penetration tester abuse misconfigured SUID binaries for privilege escalation?

6

Differentiate between Static Analysis and Dynamic Analysis when reversing engineering exploit code or malware.

7

Discuss the role of Remote Access Tools (RATs) in post-exploitation. How do they differ from standard viruses?

8

What is DLL Hijacking? Explain the Windows DLL search order that makes this attack possible.

9

Explain the concept of Maintaining Persistence. List three specific techniques used to maintain persistence on a Windows system.

10

Describe the Golden Ticket attack involving the Kerberos protocol. What specific data is required to execute this attack?

11

Why is Scripting (e.g., Python, Bash, PowerShell) essential in the post-exploitation phase? Give an example of a task that can be automated.

12

What are Rootkits? Distinguish between User-mode and Kernel-mode rootkits.

13

Define Buffer Overflow. Explain the stack-based buffer overflow mechanism using the concepts of Buffer, EIP (Instruction Pointer), and Return Address.

14

What is Mimikatz? Describe its role in credential dumping and the Pass-the-Hash attack.

15

List the key steps involved in Enumerating Assets and Users after compromising a Linux system.

16

Explain the importance of Covering Tracks. What are specific methods to clear audit logs in Windows and Linux?

17

What is Steganography in the context of system hacking and hiding files? How does it differ from Cryptography?

18

When analyzing exploit code (e.g., from Exploit-DB), what are the critical components a penetration tester must verify before running it against a live target?

19

Distinguish between Vertical Privilege Escalation and Horizontal Privilege Escalation.

20

Describe Keylogging as a post-exploitation activity. What are the two main types of keyloggers?