Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 230 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 230
Topic #: 1
[All 312-50v12 Questions]

Consider a scenario where a Certified Ethical Hacker is attempting to infiltrate a company's network without being detected. The hacker intends to use a stealth scan on a BSD-derived TCP/IP stack, but he suspects that the network security devices may be able to detect SYN packets. Based on this information, which of the following methods should he use to bypass the detection mechanisms and why?

  • A. Maimon Scan, because it is very similar to NULL, FIN, and Xmas scans, but the probe used here is FIN/ACK
  • B. Xmas Scan, because it can pass through filters undetected, depending on the security mechanisms installed
  • C. TCP Connect/Full-Open Scan, because it completes a three-way handshake with the target machine
  • D. ACK Flag Probe Scan, because it exploits the vulnerabilities within the BSD-derived TCP/IP stack
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
NikeshMaharaj
1 month, 3 weeks ago
i think its option A: To bypass detection mechanisms on a BSD-derived TCP/IP stack, the Certified Ethical Hacker should use: A. Maimon Scan, because it is very similar to NULL, FIN, and Xmas scans, but the probe used here is FIN/ACK The Maimon Scan is effective because it sends a FIN/ACK probe, which can exploit certain vulnerabilities in the TCP/IP stack of BSD-derived systems. This type of scan is less likely to be detected by network security devices that are configured to detect SYN packets, making it a suitable choice for stealth scanning.
upvoted 2 times
...
g_man_rap
6 months, 3 weeks ago
Option D, ACK Flag Probe Scan, is the most appropriate choice. This scan can provide insights into the network’s filtering behavior without the usual risks of detection associated with opening a full connection or sending irregular flag combinations, making it a more discreet option for initial reconnaissance, especially in environments that are sensitive to SYN packets.
upvoted 1 times
...
qtygbapjpesdayazko
8 months, 1 week ago
Selected Answer: D
The correct is D. Keyword "BSD-derived TCP/IP stack", BSD have a limitation in TCP/IP stack. ACK Flag Probe Scan Attackers send TCP probe packets with the ACK flag set to a remote device and then analyze the header information (TTL and WINDOW field) of the received RST packets to find out if the port is open or closed. The ACK flag probe scan exploits the vulnerabilities within the BSD-derived TCP/IP stack. Thus, such scanning is effective only on those OSs and platforms on which the BSD derives TCP/IP stacks. Module 03 Page 312
upvoted 2 times
...
przemyslaw1
9 months, 1 week ago
Selected Answer: D
Attackers send TCP probe packets with the ACK flag set to a remote device and then analyze the header information (TTL and WINDOW field) of the received RST packets to find out if the port is open or closed. The ACK flag probe scan exploits the vulnerabilities within the BSD-derived TCP/IP stack. Thus, such scanning is effective only on those OSs and platforms on which the BSD derives TCP/IP stacks.
upvoted 2 times
...
Nopez
9 months, 1 week ago
Selected Answer: D
D. via research
upvoted 1 times
...
insaniunt
9 months, 2 weeks ago
Selected Answer: B
B. Xmas Scan, because it can pass through filters undetected, depending on the security mechanisms installed. A Xmas Scan is a type of TCP port scan where the attacker sends TCP packets with the FIN, URG, and PSH flags set to target a specific range of ports. This scan is designed to evade detection mechanisms that may be configured to detect SYN packets or other standard scanning techniques.
upvoted 1 times
insaniunt
9 months, 2 weeks ago
Module 03 Page 308 and 309
upvoted 1 times
...
...
qwerty100
9 months, 2 weeks ago
Selected Answer: D
I am not very sure, but I think it's D (Module 03 Page 311and 312) ACK Flag Probe Scan Attackers send TCP probe packets with the ACK flag set to a remote device and then analyze the header information (TTL and WINDOW field) of the received RST packets to find out if the port is open or closed. The ACK flag probe scan exploits the vulnerabilities within the BSD-derived TCP/IP stack. Thus, such scanning is effective only on those OSs and platforms on which the BSD derives TCP/IP stacks.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...