worksheet_hw3

.docx

School

University Of Arizona *

*We aren’t endorsed by this school

Course

401

Subject

Computer Science

Date

Apr 3, 2024

Type

docx

Pages

1

Uploaded by JusticeGerbilMaster969

Report
SFWE 401 UArizona Homework 3 1. What is Information Gathering? Describe its types? (20pts) 2. Look at the network below. The attacker has compromised two devices, Laptop1.1 and Laptop 2.1 for passive information gathering. The attacker aims to collect more information on Laptop1.2 and Laptop2.2, as they communicate with AWS. Note: The dotted connection is a wireless connection, while the think line is a wired connection. (20pts) a. Attacker in Laptop1.1: i. Will this attacker be able to perform passive information gathering on laptop1.2? ii. Will this attacker be able to perform passive information gathering on laptop 2.2? b. Attacker in Laptop2.1: i. Will this attacker be able to perform passive information gathering on laptop1.2? ii. Will this attacker be able to perform passive information gathering on laptop2.2? 3. Describe with a diagram the working of DNS hijacking attack. (20pts) 4. What is SQL injection? Describe with examples. (20pts) 5. What is bugs framework? Describe in detail. (20pts)
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help