Google News
Ethical Hacking Interview Questions
All networks across devices are assigned a number which is unique, which is termed as MAC or Machine Access Control address. This address may be a personal mail box on the net. The network router identifies it. the amount may be modified anytime.All devices get their distinctive information processing address so they can be located easily  on a given laptop and network. Whoever is aware of your distinctive information processing address will contact you through it.
It’s best, actually, to master all 5 of Python, C/C++, Java, Perl, and LISP. Besides being the foremost vital hacking languages, they represent  totally different approaches to programming, and each of it can educate you in valuable ways.
A Trojan is a type of malware that is often developed by hackers or attackers to gain access to target systems. Users are manipulated by some attractive social media ads and then directed towards malicious sites into loading and performing Trojans on their systems.
Types of Trojans:

* Trojan-Downloader : It is a type of virus that downloads and installs other malware.
* Ransomware : It is a type of Trojan that can encrypt the data on your computer/device. 
* Trojan-Droppers : These are complex programs used by cybercriminals to install malware. Most antivirus programs do not identify droppers as malicious, and hence it is used to install viruses.
* Trojan-Rootkits : It prevents the detection of malware and malicious activities on the computer. 
* Trojan-Banker : These steal user account-related information such as card payments and online banking.
* Trojan-Backdoor : It is the most popular type of Trojan, that creates a backdoor for attackers to access the computer later on from remote using a Remote Access Tool (RAT). This Trojan provides complete control over the computer.
Enumeration is the primary phase of ethical hacking that is information gathering. In this phase, the attacker builds an active connection with the victim and tries to gain as much information as possible to find out the weaknesses or vulnerabilities in the system, and tries to exploit the system further.
Enumeration collects information about :
* Network shares
* Passwords policies lists
* IP tables
* SNMP data, if they are not secured properly
* Usernames of different systems
DNS cache poisoning is a technique that exploits vulnerabilities in the DNS (domain name system) to divert internet traffic away from legitimate servers and towards false ones. It is also known as DNS spoofing.
Cross-Site Scripting (XSS) is also referred to as a client-side code injection attack. In this, the attacker intends to execute malicious scripts on the victim’s web browser by including malicious code in a legitimate page or web application. The actual attack occurs when the victim visits the page and executes malicious code, and this web application actually becomes a vehicle to deliver the malicious script to the user’s browser. Forums, web pages, and message boards that allow comments support cross-site scripting attacks.
To fix these attacks, apply context-dependent output encoding.
Social engineering is referred to like a broad range of methods majorly intended by the people who want to hack other people’s data or make them do a specific task to benefit the hacker.
The attacker first collects the victim’s information like security protocols required to proceed with the attack, and gains the victim's trust, and breaks security practices, such as granting access to critical resources or stealing sensitive information. 
Different types of social engineering attacks include:
* Phishing
* Vishing
* Pretexting
* Quid pro quo
* Tailgating
* Spear phishing
* Baiting
coWPAtty is a C-based tool to run an offline dictionary attack against Wi-Fi Protected Access (WPA/WPA2) and audit pre-shared WPA keys using Pre-Shared Key (PSK)-based authentication. coWPAtty is capable of implementing an accelerated attack if a precomputed Pegasus Mail Keyboard (PMK file) is available for the Service Set Identifier (SSID).
Email spoofing is the act of sending emails with a forged sender address. It tricks the recipient into thinking that someone they know or trust sent them the email. Usually, it’s a tool of a phishing attack, designed to take over your online accounts, send malware, or steal funds.
Spoofed email messages are easy to make and easy to detect. However, more malicious and targeted varieties can cause significant problems and pose a huge security threat.

Email Spoofing

Reasons for email spoofing : The reasons for email spoofing are quite straightforward. Usually, the criminal has something malicious in mind, like stealing the private data of a company. Here are the most common reasons behind this malicious activity:
* Phishing. Almost universally, email spoofing is a gateway for phishing. Pretending to be someone the recipient knows is a tactic to get the person to click on malicious links or provide sensitive information.

* Identity theft. Pretending to be someone else can help a criminal gather more data on the victim (e.g. by asking for confidential information from financial or medical institutions).

* Avoiding spam filters. Frequent switching between email addresses can help spammers avoid being blacklisted.

* Anonymity. Sometimes, a fake email address is used to simply hide the sender’s true identity.

Dangers of email spoofing : Email spoofing is incredibly dangerous and damaging because it doesn’t need to compromise any account by bypassing security measures that most email providers now implement by default. It exploits the human factor, especially the fact that no person double-checks the header of every email that they receive. Besides, it’s incredibly easy for attackers and requires almost no technical know-how to do it on a basic level. Not to mention the fact that every mail server can be reconfigured to be identical or almost identical to slip by.

Source : Cybernews