Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Please answer them all or leave them to someone else. You can use this book Mich

ID: 3745050 • Letter: P

Question

Please answer them all or leave them to someone else. You can use this book Michael T. Simpson, Nicholas Antill, Hands-On Ethical Hacking and Network Defense, Third Edition.
1 Describe a Ping of Death attack as an attack that causes the victim computer to freeze and malfunction.
2What type of malware do you think is the most destructive: viruses, worms, Trojan programs, spyware, or adware?
3 Describe how to discover cookies on Web browsers, as explained in Activity 4-4.
4What is a reverse DNS lookup? Can it be used when attacking a network?
5When disposing disks or hard drives, it is recommended to format them (writing binary zeros) at least seven times. Why seven times? Please answer them all or leave them to someone else. You can use this book Michael T. Simpson, Nicholas Antill, Hands-On Ethical Hacking and Network Defense, Third Edition.
1 Describe a Ping of Death attack as an attack that causes the victim computer to freeze and malfunction.
2What type of malware do you think is the most destructive: viruses, worms, Trojan programs, spyware, or adware?
3 Describe how to discover cookies on Web browsers, as explained in Activity 4-4.
4What is a reverse DNS lookup? Can it be used when attacking a network?
5When disposing disks or hard drives, it is recommended to format them (writing binary zeros) at least seven times. Why seven times? Please answer them all or leave them to someone else. You can use this book Michael T. Simpson, Nicholas Antill, Hands-On Ethical Hacking and Network Defense, Third Edition.
1 Describe a Ping of Death attack as an attack that causes the victim computer to freeze and malfunction.
2What type of malware do you think is the most destructive: viruses, worms, Trojan programs, spyware, or adware?
3 Describe how to discover cookies on Web browsers, as explained in Activity 4-4.
4What is a reverse DNS lookup? Can it be used when attacking a network?
5When disposing disks or hard drives, it is recommended to format them (writing binary zeros) at least seven times. Why seven times? 1 Describe a Ping of Death attack as an attack that causes the victim computer to freeze and malfunction.
2What type of malware do you think is the most destructive: viruses, worms, Trojan programs, spyware, or adware?
3 Describe how to discover cookies on Web browsers, as explained in Activity 4-4.
4What is a reverse DNS lookup? Can it be used when attacking a network?
5When disposing disks or hard drives, it is recommended to format them (writing binary zeros) at least seven times. Why seven times?

Explanation / Answer

1 Describe a Ping of Death attack as an attack that causes the victim computer to freeze and malfunction.

Answer)

The ping of death is a type of Denial of Service or DOS attack where in the attacker sends an IP packet which is larger than the permissible limit of 65,536 bytes. IP fragmentation allows the IP packet to be broken into smaller segments, thus attackers take advantage of this scenario and fragments could add up more than the allowed 65,536 bytes. The operating systems which don't know what to do with the oversized packet froze and malfunctioned. Thus the Ping of Death is an attack that causes the victim computer to freeze and malfunction.

2What type of malware do you think is the most destructive: viruses, worms, Trojan programs, spyware, or adware?

Answer)

The type of malware which is the most destructive is Virus. Virus can be far more worse than the other types of malwares from in the question as virus have malicious payload which can replicate fast, spread to other systems and storages, delete files of certain types, or even entire drive contents making data irrecoverable.

3 Describe how to discover cookies on Web browsers, as explained in Activity 4-4.

Answer)

We all know that Web Browser saves and manages the cookies. Now, where to discover and find these cookies depends on separate browser to browser. For example, from the Chrome Browser, go into the Settings from the menu in the top right corner of the browser. Then go to Show advanced settings. Then visit Privacy, select the Content settings. To manage cookies, check - Cookies. For viewing or removing individual cookies, we should click - All cookies and site data. We can delete cookies using - All cookies and site data - Remove all.

4What is a reverse DNS lookup? Can it be used when attacking a network?

Answer)

DNS lookup is the process of getting the Domain name associated with an IP address. Now the reverse of this is the reverse DNS lookup which is the looking up of an IP address from a provided domain name. The primary use of DNS lookup while attacking a network will be to get hand on the network's DNS and attacking with DDOS Distributed Denial of Service attacks on the network.

5When disposing disks or hard drives, it is recommended to format them (writing binary zeros) at least seven times. Why seven times?

Answer)

When hard drives reach their end of life and when disposing disks or hard drives, it is recommended to format them 7 times as per also the Department of Defense where it is considered that at least 7 times an information or formatting has to be overwritten to ensure its disposal and to ensure that the data stored is irrecoverable. It is to securely erase the data and permanently remove all data from the disk.