What is Protocol Fuzzing?
tests the robustness of communication protocols
What is Packet crafting?
by using crafted packets
Are deauthentication attacks a type of DoS attack?
Yes
Are WPS attacked are usually what type of attack?
brute force
Pixie Dust attacks are what type of offline line attack?
WPS
What are CronTabs?
A list or table of commands that you want to execute
Where is the CronTab normally stored in Linux?
in the /etc directory
What does crontab -e do?
edit command
What does crontab -l do?
lists the contents of the crontab file
What does crontab -r do?
removes the current crontab file
What does crontab -i do?
removes the current crontab file but prompts you
What are Daemons
Daemons consume memory even when not in use, which may tip off users if they experience performance issues or if they are actively monitoring memory usage. Also, daemons do not automatically restart upon termination unless specifically programmed to do so.
VM sprawls refers to
to creating virtual machines (VMs) without proper change control procedures, which can create a vulnerable environment.
VM escape is an attack where malware running in a VM is able to
interact directly with the hypervisor or host kernel.
Mobile security framework (MobSF) provides an
automated evaluation of code and malware analysis, using both static and dynamic analysis.
Mobile application management (MAM) sets policies for apps
that can prevent unauthorized apps from being installed, automatically push out updates, and enable clients to select from a list of corporate compliant apps they can install.
Open VAS will
list the vulnerabilities along with a risk rating
What is Objection?
It is a runtime exploration toolkit that works in iOS devices.