During the intelligence-gathering phase of a penetration test, you discover a press release by a security products vendor stating that they have signed a multi-million dollar agreement with the company you are targeting. The contract was for vulnerability assessment tools and network based IDS systems.
While researching on that particular brand of IDS you notice that its default installation allows it to perform sniffing and attack analysis on one NIC and is managed and sends reports via another NIC. The sniffing interface is completely unbound from the TCP/IP stack by default. Assuming the defaults were used, how can you detect these sniffing interfaces?
A.
Send attack traffic and look for it to be dropped by the IDS
B.
Use a ping flood against the IP of the sniffing NIC and look for latency in the responses
C.
Set your IP to that of the IDS and look for it to begin trying to knock your computer off the network
D.
The sniffing interface cannot be detected
Correct answer is D
D is the Ans.
expendables 3 music download
http://www.zkRCZC3urT.com/zkRCZC3urT