201CS009
201CS009
Module-1
1 a. List and explain steps involved in footprinting Analysis with suitable examples. (10 Marks)
b. Briefly explain basic banner grabbing enumeration technique. (05 Marks)
c. Write a note on IAAAS. (05 Marks)
Important Note : 1. On completing your answers, compulsorily draw diagonal cross lines on the remaining blank pages.
OR
2 a. Discuss the Fyodor port scanning techniques. (08 Marks)
b. Discuss XP/Server 2003 setting and recommended configurations. (07 Marks)
c. Explain ARP Host Discovery. (05 Marks)
Module-2
3 a. What is Vulnerability mapping? List and explain different methods used by an attacker to
accomplish this task. (05 Marks)
b. With neat diagram, explain contents of security descriptor. (05 Marks)
c. List common types of remote attacks and briefly explain any five. (10 Marks)
OR
4 a. Define after hacking root and explain the composition of root kit in detail. (10 Marks)
b. What is Modular Crypt Format (MCF)? List and explain three fields that compromise the
MCF format. (05 Marks)
c. What are the conditions under which input validation attack occurs? Explain briefly.
(05 Marks)
Module-3
5 a. List the important factors which needs to identify for Brute-Force scripting and explain.
(10 Marks)
b. Describe the counter measures that are used to defend the SQL injection. (05 Marks)
c. List the sequence of events that take place when a CISCO IP phone boots s up. (05 Marks)
OR
6 a. List and explain different categories of web server vulnerabilities. (10 Marks)
b. Briefly explain tunnel establishment IPSec VPNs. (05 Marks)
c. Briefly explain VPN hacking. (05 Marks)
1 of 2
201CS009
Module-4
7 a. Bring out the important features of DOS. (06 Marks)
b. List and briefly explain types of firewalls. (06 Marks)
c. Discus wireless scanning and enumeration. (08 Marks)
OR
8 a. Explain packet filtering in detail. (08 Marks)
b. What are the features focused by web application attacks? (06 Marks)
c. Briefly explain web-crawling and web crawling tools. (06 Marks)
Module-5
9 a. List and explain common tools used to perform web application hacking. (06 Marks)
b. What are back doors? Explain remote control back doors with an example. (08 Marks)
c. Briefly explain session Hijacking. (06 Marks)
OR
10 Write a note on the following :
a) Subverting the system environment.
b) Hacking the internet use.
c) SSL Fraud
d) IRC hacking (20 Marks)
*****
2 of 2