How do you prevent packet-sniffing exploits?
Encrypt network communication with SSL
A company is victim to a breach where a database full of PII data is compromised due to default DB credentials, which GDPR principal has not been followed
Integrity and Confidentiality
At which point of the engagement lifecycle would you crack password hashes?
Post-Exploitation
Which part of the Computer Misuse Act provides details about Jurisdiction
4
which command can be used to identify OS version and traceroute to host
nmap -A 192.168.1.1
what is the default scan used by nmap
SYN Scan
which type of request sends data in the body of the request
POST
What is typically the slowest scan
UDP scan
What does a UNION SELECT command achieve
chains mutiple select statements together
what does the -sV flag do
starts a Version Scan