312-50v12 Exam QuestionsBrowse all questions from this exam

312-50v12 Exam - Question 28


To create a botnet, the attacker can use several techniques to scan vulnerable machines. The attacker first collects information about a large number of vulnerable machines to create a list. Subsequently, they infect the machines. The list is divided by assigning half of the list to the newly compromised machines. The scanning process runs simultaneously. This technique ensures the spreading and installation of malicious code in little time.

Which technique is discussed here?

Show Answer
Correct Answer: C

The technique described involves collecting a list of vulnerable machines, infecting them, and then dividing the list so that newly compromised machines continue the scanning process. This continuous and parallel scanning ensures rapid infection and spreading of malicious code. This is known as the hit-list scanning technique.

Discussion

13 comments
Sign in to comment
jeremy13
Oct 10, 2023

C - Hit-List scanning technique 312-50v11- questions 147 Module 10 P1429 V12 *Hit-list Scanning Through scanning, an attacker first collects a list of potentially vulnerable machines and then creates a zombie army. Subsequently, the attacker scans the list to find a vulnerable machine. On finding one, the attacker installs malicious code on it and divides the list in half. The attacker continues to scan one half, whereas the other half is scanned by the newly compromised machine. This process keeps repeating, causing the number of compromised machines to increase exponentially. This technique ensures the installation of malicious code on all the potentially vulnerable machines in the hit list within a short time. *Topological Scanning This technique uses the information obtained from an infected machine to find new vulnerable machines. An infected host checks for URLs in the hard drive of a machine that it wants to infect. Subsequently, it shortlists URLs and targets, and it checks their vulnerability. This technique yields accurate results, and its performance is similar to that of the hit-list scanning technique.

sTaTiKOption: C
Nov 1, 2023

Anser is Hitlist: The technique discussed here is the Hit-list scanning technique. In the Hit-list scanning technique, the attacker creates a list of potential targets that are vulnerable to a specific exploit or attack. The attacker then uses this list to scan and infect the vulnerable machines. Once a machine is compromised, it can be used to scan for and infect other vulnerable machines on the list. The list is then divided among the compromised machines, and the scanning process continues until all the machines on the list are infected. This technique is often used to create botnets, which are networks of infected machines that can be controlled by the attacker. Botnets can be used for various purposes, such as launching DDoS attacks, stealing sensitive information, or distributing spam or malware. The Hit-list scanning technique allows the attacker to quickly infect a large number of machines and create a powerful botnet.

ChiplessOption: C
Oct 14, 2023

Hit-list Scanning SOURCE: CEH v12 eBook Module 10 pg 954

eli117Option: C
Oct 4, 2023

C. Hit-list scanning technique. Explanation: The technique described in the scenario is known as the hit-list scanning technique, where an attacker compiles a list of potential targets, and then targets them by dividing the list and assigning each part to a different infected machine. This allows for simultaneous scanning, increasing the spread of the malicious code.

jeremy13Option: C
Nov 3, 2023

C. Hit-list scanning technique.

HenrikrpOption: C
Dec 28, 2023

C. Hit-list scanning technique.

ZacharyDriverOption: C
Jan 24, 2024

C. Hit-list Scanning Technique

BenignhackOption: C
Feb 11, 2024

c, hit list scanning

eronmelo
Mar 27, 2024

C. Hit-List Scanning Ebook CEHv12 Module 10 Page 1429

insaniuntOption: C
May 26, 2024

C. Hit-list scanning technique

SumanSantroOption: C
Jun 25, 2024

Option C. Hit-list scanning technique. is the correct answer

NicknpOption: C
Nov 14, 2024

Option C hitlist scanning technique

Mann098Option: C
Dec 29, 2024

Hit-List scanning technique