social media

Emily, an extrovert obsessed with social media, posts a large amount of private information, photographs, and location tags of recently visited places. Realizing this, James, a professional hacker, targets Emily and acquaintances, conducts a location search to detect their geolocation by using an automated tool, and gathers information to perform other sophisticated attacks. What is tool employed by James in the above scenario?

Emily, an extrovert obsessed with social media, posts a large amount of private information, photographs, and  location tags of recently visited places. Realizing this, James, a professional hacker,  targets Emily and acquaintances, conducts a location search to detect their geolocation by using an automated tool, and gathers information to perform other sophisticated attacks.
What is tool employed by James in the above scenario?

Option 1 : Ophcrack
Option 2 : HootSuite
Option 3 : HULK
Option 4 : VisualRoute

1. Ophcrack

Ophcrack may be a free Windows password cracker based on rainbow tables. it’s a very efficient implementation of rainbow tables done by the inventors of the strategy. It comes with a Graphical the method and runs on multiple platforms.

Features:
  • Runs on Windows, Linux/Unix, Mac OS X, …
  • Cracks lumen and NTLM hashes.
  • Free tables available for Windows XP and Vista/7.
  • Brute-force module for simple passwords.
  • Audit mode and CSV export.
  • Real-time graphs to analyze the passwords.
  • LiveCD available to alter the cracking.
  • Dumps and loads hashes from encrypted sam recovered from a Windows partition.
  • Free and open supply software system (GPL).
2. HootSuite

Hootsuite may be a social media management platform that covers virtually each side of a social media manager’s role.

With only one platform users area unit ready to do the easy stuff like reverend cool content and schedule posts on social media in all the high to managing team members and measure ROI.

There area unit many totally different plans to decide on from, from one user set up up to a bespoken enterprise account that’s appropriate for much larger organizations.

3. HULK

HULK flood, may be a DDoS attack named by its creators “HTTP unendurable Load King” is similaralogous|is comparable} to an HTTP flood and is intended to overwhelm net servers’ resources by incessantly requesting single or multiple URL’s from several supply assaultive machines.

HULK flood differs from most on the market DDoS attack tools that created foreseeable recurrent patterns that might simply be relieved. The principle behind the HULK flood is that a novel pattern is generated at every and each request, with the intention of accelerating the load on the servers further as evading any intrusion detection and interference systems.

Some HULK Techniques
  • Obfuscation of supply shopper – this can be done by employing a list of known User Agents, and for each request that’s made, the User Agent may be a random worth out of the known list
  • Reference Forgery – the referrer that points at the request is obfuscated and points into either the host itself or some major prelisted websites.
  • Stickiness – victimisation some commonplace HTTP command to do and raise the server to keep up open connections by victimisation Keep-Alive with variable time window
  • no-cache – this can be a given, however by asking the HTTP server for no-cache , a server that’s not behind an avid caching service can gift a novel page.
  • Unique Transformation of computer address – to eliminate caching and alternative improvement tools, crafting custom parameter names and values and that they area unit randomised and connected to every request, rendering it to be distinctive, change the request to bypass several CDN systems.

When the servers’ limits of synchronous connections area unit reached, the server will not reply to legitimate requests from alternative users.

It value to say that HULK attack demands several resources for shopper facet further, thus one node won’t be ready to run high attack rates.

4. VisualRoute

VisualRoute offers a good style of network tools that facilitate users keep one step previous network problems like bottle necks and packet loss/latency problems.

The tools includes:
  • Continuous trace routing
  • Reverse tracing
  • time interval graphing
  • Port inquisitory
  • Network scanning
  • Trace route history
  • facet by facet trace route comparison
  • Route analysis (NetVu)
  • Custom maps
  • Remote access server
  • Save traceroutes as text, image or HTML

VisualRoute Business and Support professional editions permits the user to run an overseas access server.

From this portal a user will run a trace route, plot response times and manage remote agents from anyplace within the world.

View a trace route in an exceedingly totally different means, victimisation VisualRoute’s route graph read.

This read concentrates on the response times of every hop throughout the route and may be a good way to quickly see however any given route is activity.

Learn CEH & Think like hacker


This Blog Article is posted by

Infosavvy, 2nd Floor, Sai Niketan, Chandavalkar Road Opp. Gora Gandhi Hotel, Above Jumbo King, beside Speakwell Institute, Borivali West, Mumbai, Maharashtra 400092

Contact us – www.info-savvy.com

https://g.co/kgs/ttqPpZ

Leave a Comment