Short answer: The integer e is chosen arbitrarily from 1 to (p-1)*(q-1), and thus gives no information on n Long answer: The difference between knowing the pair (e,n) and just n alone is knowledge of e. e is chosen to be any arbitrary integer in 1,...,(p-1)*(q-1) avoiding only common divisors of p*q, that is { k*p } union { k*q }, a small fraction of the total (p-1)*(q-1) numbers.
If Eve knows (e,n) and can factor n, then Eve knows p and q. Eve can then: 1) Find d such that e*d = 1 mod (p-1)*(q-1), and can do this quickly > using the extended euclidean algorithm 2) decrypt cypertext c by computing m = (c**d)%(p*q) 2/3 for above two steps without any details 3/3 for some details (ie that Eve can do all of this quickly)
5/5 Correct and Complete Answer 3/5 Somewhat correct but evidence of misconceptions
Nikto: Open source web Server Scanner that performs vulnerability scanning, and tests for dangerous files/programs, version specific issues, server configurations, etc
Defender can use it by:
Defender can use it for:
1 mark for definition. 2 marks for what defender can use it for.
How OS can prevent it:
How application can prevent it:
3 marks for explaining DLL Hijacking correctly and with all key details 1 mark for how OS can prevent it 1 mark for how application can prevent it
Pretexting: individual lies to obtain privileged data. Ex: IRS scam with threats of consequences Quid Pro Quo: something given to you / done for you in return for something. Ex: give your creds to someone to fix a problem Baiting: real world Trojan horse. Ex: access to a resource silently installs malware Piggybacking: Getting unauthorized access through an authorized but unaware person. Ex: holding the door open for someone else Shoulder Surfing: observing someone’s private information, commonly in public places Phishing: obtaining info via fraudulent means. Ex: fake facebook site that looks like the real one but actually submits your creds to hacker 2 marks for each correct definition. If > 4 definitions given, remaining ones ignored
SET: set of tools attacker can use to perform various social engineering attacks. For the demo, it was used to clone facebook.com Ettercap: tool used for MITM attacks, capable of intercepting traffic on the network. For the demo, it was used to perform arp cache poisoning on the router so that attacker machine was able to sit in between a regular user and the DNS Server/ router. This allowed the attacker to redirect user to attacker’s web server running fake facebook.com Apache (HTTP server): open source HTTP server that was used to host the cloned facebook.com site in the demo DNS Server: Server that machines on the network talk to in order get IP addresses of domain names. For the demo, The attacker imitated the router/DNS server and mapped facebook.com domain to the IP address of hacker’s web server running the fake site. Creation of Digital Certs: When using HTTPS protocol, digital certificates are used to provide public key of the web server by a trusted authority to the requesting client/browser to initiate an encrypted communication. In the demo, self-signed certificates were made and added to the webserver – such that when a victim is redirected to the attacker’s servers, they’re able to communicate with https protocol so long as they accept the warning on the self-signed certificate (which people tend to do) 1 mark for correctly identifying role of each of the 5 components 5 marks for clear, concise outline of the demo
Full marks for covering all important pieces without errors