0% found this document useful (0 votes)
76 views

Module Code & Module Title CC6051NI Ethical Hacking Assessment Weightage & Type Weekly Assignment

The document is a weekly assignment submission for an Ethical Hacking module. It includes information such as the module code, assessment details, student details, and confirmation that the assignment was submitted before the deadline. The assignment contains answers to 5 questions about topics in cybersecurity including social engineering, port scanning, cookies, enumeration, and identity theft.

Uploaded by

Bipin Bhandari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
76 views

Module Code & Module Title CC6051NI Ethical Hacking Assessment Weightage & Type Weekly Assignment

The document is a weekly assignment submission for an Ethical Hacking module. It includes information such as the module code, assessment details, student details, and confirmation that the assignment was submitted before the deadline. The assignment contains answers to 5 questions about topics in cybersecurity including social engineering, port scanning, cookies, enumeration, and identity theft.

Uploaded by

Bipin Bhandari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Module Code & Module Title

CC6051NI Ethical Hacking


Assessment Weightage & Type Weekly
Assignment

Semester
2021 Autumn
Student Name: Bipin Bhandari
London Met ID: 2004911
College ID: np01nt4s210140
Submitted To: Aditya Sharma
Assignment Due Date: March 27, 2023
Assignment Submission Date: March 27, 2023

I confirm that I understand my coursework needs to be submitted online via Google Classroom under the
relevant module page before the deadline in order for my assignment to be accepted and marked. I am
fully aware that late submissions will be treated as non-submission and a mark of zero will be awarded.
a) What is Social Engineering Fraud? How can user protect from social
engineering attack.

Ans Social engineering fraud is a type of cybercrime in which an attacker uses


psychological manipulation to persuade victims to reveal sensitive information, transfer
money, or perform an action that benefits the attacker is known as social engineering
fraud. Social engineering fraud is commonly perpetrated via electronic communication
channels such as email, phone calls, text messages, or social media.

Some tips on how to protect yourself from social engineering attacks:

• Be wary of unsolicited requests for personal information: If someone asks you for
sensitive information, such as your passwords, credit card numbers, or bank
account information, don't give it to them unless you're confident in their identity
and purpose.
• Use caution when using social media: Use caution when sharing personal
information on social media platforms. Based on the information you post,
cybercriminals may target you with social engineering attacks.
• Be wary of unsolicited requests for personal information: If someone asks you for
sensitive information, such as your passwords, credit card numbers, or bank
account information, don't give it to them unless you're confident in their identity
and purpose.
• Do not click on unknown links or download attachments: Social engineering
attackers frequently use phishing emails or messages that contain malicious links
or attachments. Be cautious of such messages and double-check the source
before clicking on anything.
b) Using suitable examples distinguish between open ports, closed ports, and
filtered ports, which are reported by scanning programs.

Ans

• Open ports: A port that is open is one that is actively looking for connections from
other systems. This means a program or service is running on that port and is ready
to receive data. An example of an open port is Port 80, which is commonly used for
web traffic. Using an open port, an attacker can gain unauthorized access to a
system or launch an attack.

• Closed ports: Closed ports are those that are not actively listening for connections
and thus cannot accept connections from remote systems. This means that there is
currently no application or service running on that port. When a port scanner sends a
packet to a closed port, it will receive a response indicating that the port is closed. A
closed port is port 3389, which is used for remote desktop access on Windows
systems.

• Filtered ports: A filtered port is one that does not respond to a port scanner's
request. This could indicate that a firewall or other security device has blocked the
port, or that the system has been configured to ignore the request. If a port scanner
sends a packet to a filtered port, it will not receive a response. A filtered port is Port
22, which is used for SSH connections.
c) How can cookies be used in a cyber-attack.

Ans Cookies are small files that websites that the user visits save on the user's
computer. Cookies can be used for legitimate purposes such as remembering a user's
website preferences or keeping them logged in. Cookies, on the other hand, have the
following uses in cyber-attacks:

Here are some ways cookies can be used in a cyber-attack:

• Session hijacking: When a cookie is used to steal a user's session ID, the user's
identity is impersonated, and they gain unauthorized access to their account.

• Cross-site scripting (XSS): When an attacker injects malicious scripts into cookies,
the scripts are then executed when a user visits a vulnerable website. As a result,
the attacker could obtain sensitive information such as usernames, passwords, and
credit card numbers.

• Cross-site request forgery (CSRF): Malicious advertisements can contain


malware-infected cookies. When a user clicks on the ad, malware is downloaded
onto their computer, giving the attacker access to sensitive information.

• Stealing personal information: Cookie poisoning happens when an attacker


modifies cookies on a user's computer to change their settings, such as language
preferences or security settings. This gives the attacker the ability to launch
additional attacks on the user's computer.
d) Describe the process of enumeration, the kind of information gathered and

how it might aid an attacker.

Ans The process of gathering information about a target system or network in order to
identify potential vulnerabilities and weaknesses is known as enumeration. Attackers
typically use it as a reconnaissance technique to gather intelligence on a target prior to
launching a more targeted attack. Enumeration data can be used to identify potential
targets, prioritize attack vectors, and devise an effective attack strategy.

The process of enumeration typically involves the following steps:

• Port scanning: The process of searching the target network for open ports and
services running on those ports is known as port scanning. This information can be
used to spot potential flaws or misconfigurations.

• Service enumeration: The process of determining the type, version, and


configuration of services running on open ports is known as service enumeration.
This can provide information about potential service vulnerabilities.

• User enumeration: User enumeration refers to the process of identifying user


accounts and privileges on the target network. This data can be exploited to gain
access to potentially vulnerable systems or applications.

• Password Cracking: Password cracking is the process of attempting to guess or


crack passwords for specific network user accounts. This can be accomplished using
a variety of techniques, such as brute-force attacks, dictionary attacks, and social
engineering.
e) How can individuals stay protected from identity theft?

Ans Identity theft is a serious cybercrime in which a person's personal information,


such as their name, social security number, credit card information, or other sensitive
data, is stolen and then used fraudulently by an attacker. Individuals can guard against
identity theft in the following ways:

• Use strong and unique passwords: For all online accounts, use strong,
complex passwords, and avoid using the same password for multiple accounts.
To generate and store strong passwords, consider using a password manager.

• Be on the lookout for phishing scams: Be wary of emails, phone calls, or text
messages that request personal information or demand immediate action. Before
disclosing personal information, confirm the source and authenticity of any
requests.

• Use secure Wi-Fi connections: When conducting sensitive transactions such


as online banking or shopping, avoid using public Wi-Fi networks. To protect your
personal information, use a secure, encrypted Wi-Fi connection or a virtual
private network (VPN).

• Personal data must be kept secure: When sharing personal information online
or with strangers, exercise caution. Sharing sensitive information, such as your
social security number or credit card number, should be avoided unless
absolutely necessary and you have complete confidence in the recipient's identity
and intent.
• Examine your credit reports on a regular basis for any suspicious activity or
accounts that you did not open. The three major credit bureaus are required to
provide you with one free credit report each year (Equifax, Experian, and
TransUnion).

• To secure personal devices like your computer and smartphone, use strong
passwords, anti-virus software, and regular software updates.

• Multi-factor authentication (MFA) should be enabled for all online accounts that
support it. MFA adds an extra layer of security by requiring a second factor in
addition to your password, such as a code sent to your phone.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy