adplus-dvertising
frame-decoration

Question

Which tool allows the creation of complex actions like custom-crafting TCP or other packets for testing vulnerabilities or exploits?

a.

Wireshark

b.

Hping

c.

Scapy

d.

Netcat

Answer: (c).Scapy Explanation:Scapy allows the creation of complex actions like custom-crafting TCP or other packets for testing vulnerabilities or exploits.

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Which tool allows the creation of complex actions like custom-crafting TCP or other packets for testing vulnerabilities or exploits?

Similar Questions

Discover Related MCQs

Q. What are the most common means of enumerating users through exposed services?

Q. What is theHarvester used for in penetration testing?

Q. What functionality does Metasploit include for email harvesting?

Q. Why is email user enumeration considered a very important technique in penetration testing?

Q. What is the focus of social media enumeration in penetration testing?

Q. What is a common reason for penetration testers to target group management interfaces and tools?

Q. How can SNMP be used for user enumeration?

Q. What tool can be used to gather Samba users?

Q. How can social media mapping tools be useful for penetration testers?

Q. What is the purpose of enumerating Samba shares in penetration testing?

Q. What is the purpose of web crawling in penetration testing?

Q. What is the role of a robots.txt file in web crawling?

Q. What is web scraping in the context of penetration testing?

Q. Why do penetration testers manually inspect robots.txt files?

Q. What is a common practice for penetration testers when reviewing web links?

Q. How can Glassdoor and similar websites be useful for penetration testers?

Q. What information can be obtained through application fingerprinting in penetration testing?

Q. How does banner grabbing contribute to application fingerprinting?

Q. What role does Netcat play in banner grabbing for application fingerprinting?

Q. How can vulnerability scanners and web application security tools complement application fingerprinting?