Ethical Hacking Ch.7
List 3 fundamental concepts of programming
1. Branching 2. Looping 3. Testing
List 4 syntax rules of perl
1. sub keyword is used in front of function names 2. variables begin with $ 3. comment lines begin with # 4. & indicates a function
What is the industry standard for bugs per code?
10 bugs for every 1000 lines
When was C developed?
1972
When was perl developed? By who?
1987, Larry Wall
Metasploit
A Ruby-based program used by security testers to check for vulnerabilities on computer systems
Branching
A type of program flow that takes you from one program area to another
Ruby
An object oriented language used by many security testers (similar to perl)
Who developed C?
Dennis Ritchie at Bell Laboratories
HTML a programming language (true or false)
False, it is a markup language (formatting language)
What do the symbols < and > denote?
HTML tags
What are the 2 types of operators?
Mathematical and Logical
Practical Extraction and Report Language (perl)
Powerful scripting language used to write scripts and programs for security professionals
Braces
Show where a function begins and ends
Conversion specifiers
Tell the compiler how to convert values in a function
What language was UNIX first written in? What language is it written in now?
assembly, c
Compiler
converts text-based program (i.e. source code) into executable or binary code
What does the "perldoc -f print" command do?
display description of a Perl print command
HTML uses branching, looping, and testing (true or false)
false
No C compilers can also create executable programs in C++ (true or false)
false
C is a weak and lengthy language (true or false)
false, it is powerful and concise
Perl does not run well on every platform (true or false)
false, runs on almost any platform
Hackers use C to create automates exploits and malicious bots (true or false)
false, they use perl
What does the "perl -h" command do?
gives a list of parameters used with perl command
#include statements in C code do what?
load libraries that hold commands and functions
What language is used by security professionals to perform repetitive tasks and conduct security monitoring (true or false)
perl
What are two of the most popular languages for security professionals?
perl and python
Classes
structures that hold pieces of data and functions
What is the :: symbol used for?
to separate the name of a class from a member function
C and Perl have similar syntax (true or false)
true
C++ is an enhancement of C (true or false)
true
Security professionals often need to examine web pages in order to recognize when something looks suspicious (true or false)
true
Security testers must have an understanding of Ruby basics and be able to modify the Ruby code (true or false)
true
Each HTML tag has a matching closing tag (true or false)
true, <HTML> and </HTML>
What is HTML mainly used for? Why?
web page formatting and layout because the syntax is basis for web development