Question |
Raised by |
Status |
Solution |
|
Alford, Ronald Wayne |
Need
Question |
|
Various
testing techniques are used when the networking devices are installed in the
network? How are those techniques different than red and blue teaming? Do they
overlap to certain extent? |
Bahety, Anand Baldeodas |
Need
Solution |
|
|
Bucatanschi, Dan George |
Need
Question |
|
|
Chandra, Deepti Jagdish |
Need
Question |
|
Describe
how user passwords are stored as hasing and must-have
properties of the hash function. How does the system authenticate a user when
it doesn't store the user password to compare? Show a simple way to execute a
dictionary-based attack. |
Huynh, Thuan Quang |
Need
Solution |
|
|
Nguyen, Bao Ngoc |
Need
Question |
|
What
are the real advantages of vulnerability scanners? They seem to be having
more negative effects like generating extra network traffic, reporting vulnerabilites when none exist. |
Konda, Shravya Reddy |
Need
Solution |
|
|
Lee, Joonghoon |
Need
Question |
|
|
Liu, Liping |
Need
Question |
|
A
strong Linux/Unix password is one that is long (greater than 10 characters at
least) and complex (contains both upper and lower case letters, special characters
and numbers) Creating a strong Windows password is somewhat more complicated.
Why? |
Wongsuphasawat, Krist |
Need
Solution |
|
What
are the relative advantages and disadvantages of 'red teaming' and 'blue teaming' in penetration testing? |
Reisner, Elnatan
Benjamin |
Need
Solution |
|
|
Schulman, Aaron David |
Need
Question |
|
|
Sharara, Hossam Samy Elsai |
Need
Question |
|
Explain
how the concepts of "white-box" and "black-box" testing
apply to network security testing. |
Stuckman, Jeff |
Need
Solution |
|
|
Teoh, Alison Lui Koon |
Need
Question |
|
It is
apparent that penetration testing is very slow and many hosts on a large size
network would not be tested. Explain how it can be automated in order to
speed up the process. |
Thakor, Shashvat Advait |
Need
Solution |
|
|
Vador, Sachin Shashikant |
Need
Question |
|
Describe
the two types of penetration testing (Red Teaming and Blue Teaming), and
explain the difference between these techniques. |
Donlon, Eileen Merle |
Need
Solution |
|
|
Zazworka, Nico |
Need
Question |
|