Module Code & Module Title CC6051NI Ethical Hacking Assessment Weightage & Type Weekly Assignment
Module Code & Module Title CC6051NI Ethical Hacking Assessment Weightage & Type Weekly Assignment
Semester
2021 Autumn
Student Name: Bipin Bhandari
London Met ID: 2004911
College ID: np01nt4s210140
Submitted To: Aditya Sharma
Assignment Due Date: March 27, 2023
Assignment Submission Date: March 27, 2023
I confirm that I understand my coursework needs to be submitted online via Google Classroom under the
relevant module page before the deadline in order for my assignment to be accepted and marked. I am
fully aware that late submissions will be treated as non-submission and a mark of zero will be awarded.
a) What is Social Engineering Fraud? How can user protect from social
engineering attack.
• Be wary of unsolicited requests for personal information: If someone asks you for
sensitive information, such as your passwords, credit card numbers, or bank
account information, don't give it to them unless you're confident in their identity
and purpose.
• Use caution when using social media: Use caution when sharing personal
information on social media platforms. Based on the information you post,
cybercriminals may target you with social engineering attacks.
• Be wary of unsolicited requests for personal information: If someone asks you for
sensitive information, such as your passwords, credit card numbers, or bank
account information, don't give it to them unless you're confident in their identity
and purpose.
• Do not click on unknown links or download attachments: Social engineering
attackers frequently use phishing emails or messages that contain malicious links
or attachments. Be cautious of such messages and double-check the source
before clicking on anything.
b) Using suitable examples distinguish between open ports, closed ports, and
filtered ports, which are reported by scanning programs.
Ans
• Open ports: A port that is open is one that is actively looking for connections from
other systems. This means a program or service is running on that port and is ready
to receive data. An example of an open port is Port 80, which is commonly used for
web traffic. Using an open port, an attacker can gain unauthorized access to a
system or launch an attack.
• Closed ports: Closed ports are those that are not actively listening for connections
and thus cannot accept connections from remote systems. This means that there is
currently no application or service running on that port. When a port scanner sends a
packet to a closed port, it will receive a response indicating that the port is closed. A
closed port is port 3389, which is used for remote desktop access on Windows
systems.
• Filtered ports: A filtered port is one that does not respond to a port scanner's
request. This could indicate that a firewall or other security device has blocked the
port, or that the system has been configured to ignore the request. If a port scanner
sends a packet to a filtered port, it will not receive a response. A filtered port is Port
22, which is used for SSH connections.
c) How can cookies be used in a cyber-attack.
Ans Cookies are small files that websites that the user visits save on the user's
computer. Cookies can be used for legitimate purposes such as remembering a user's
website preferences or keeping them logged in. Cookies, on the other hand, have the
following uses in cyber-attacks:
• Session hijacking: When a cookie is used to steal a user's session ID, the user's
identity is impersonated, and they gain unauthorized access to their account.
• Cross-site scripting (XSS): When an attacker injects malicious scripts into cookies,
the scripts are then executed when a user visits a vulnerable website. As a result,
the attacker could obtain sensitive information such as usernames, passwords, and
credit card numbers.
Ans The process of gathering information about a target system or network in order to
identify potential vulnerabilities and weaknesses is known as enumeration. Attackers
typically use it as a reconnaissance technique to gather intelligence on a target prior to
launching a more targeted attack. Enumeration data can be used to identify potential
targets, prioritize attack vectors, and devise an effective attack strategy.
• Port scanning: The process of searching the target network for open ports and
services running on those ports is known as port scanning. This information can be
used to spot potential flaws or misconfigurations.
• Use strong and unique passwords: For all online accounts, use strong,
complex passwords, and avoid using the same password for multiple accounts.
To generate and store strong passwords, consider using a password manager.
• Be on the lookout for phishing scams: Be wary of emails, phone calls, or text
messages that request personal information or demand immediate action. Before
disclosing personal information, confirm the source and authenticity of any
requests.
• Personal data must be kept secure: When sharing personal information online
or with strangers, exercise caution. Sharing sensitive information, such as your
social security number or credit card number, should be avoided unless
absolutely necessary and you have complete confidence in the recipient's identity
and intent.
• Examine your credit reports on a regular basis for any suspicious activity or
accounts that you did not open. The three major credit bureaus are required to
provide you with one free credit report each year (Equifax, Experian, and
TransUnion).
• To secure personal devices like your computer and smartphone, use strong
passwords, anti-virus software, and regular software updates.
• Multi-factor authentication (MFA) should be enabled for all online accounts that
support it. MFA adds an extra layer of security by requiring a second factor in
addition to your password, such as a code sent to your phone.