CEH V9 Ch 16
Jennifer has captured the following URL:wwwsnaz22enu.com/&w25/session=22525. She realizes that she can perform a session hijack. Which utility would she use?
DroidSheep
Which technology can provide protection against session hijacking?
IPsec
What could a company do to protect itself from a loss of data when a phone is stolen?
Passwords--Encryption---Remote wipe
What is the benefit of encryption on mobile devices?
Protection of data on lost or stolen devices
What does rooting a device do?
Provides root-level access to a user on a system
Session hijacking can be thwarted with which of the following?
Psiphon
What utility could be used to avoid sniffing of traffic?
Psiphon
NetCut is used to do what
Test firewalls---Craft packets
A utility for auditing WordPress from Android is ___________
WPScan
Remote wipes do what?
Wipe all data off a device----Remove sensitive information such as contacts from a remote system
A session hijack can be used against a mobile device using all of the following except
Worms
Jailbreaking a phone refers to what?
Acquiring root access on a device.
A man-in-the browser attack delivered by a piece of malware can be prevented by which of the following?
Anti-virus
iOS is based on which operating system?
OS X
An attack that can be performed using FaceNiff is _________________
Inserting oneself into an active session
What option would you use to install software that's not from the Google Play store?
Install from unknown sources.
A denial of service application for Android is __________________
LOIC
Android is based on which operating system?
Linux
When a device is rooted, what is the effect on security?
Lowered
Jennifer is concerned about her scans being tracked back to her tablet What could she use to hide the source of the scans?
SandroProxy