You are on page 1of 3

HackFest Workshop

Short listing Criteria

Due to limitations on the number of people we can offer place at Techfest workshops, we follow a
scrutinizing process. The participants will have to fill in the following questionnaire based on
which short listing shall be done.

Instructions

• The following questions have to be answered in the space provided.


• Name the file after the questions has been answered as “HFxxxx.doc” where HFxxxx is the team
registration number. Attach the file and mail it to workshops[at]techfest[dot]org before 20th
November 2010.

•Being shortlisted in workshop do not assure your accommodation.

Note that the following instructions have to be strictly adhered to and failing to do so will
lead to disqualification of the concerned entry.

Q.1 What is Scanning?

It is a process that generates digital representation of a file for data input or action
for machine.(machine can be termed as computer).

Q.2 Describe the following terms in Scanning.

(i) Nmap

Mapping of all the network connected to the system is known as Nmap.It is a security
scanner capable of discovering Hosts and services on a computer network.

(ii) Nullscan

This is a method to trick firewall-filters.The Null Scan is a type of TCP(Transmission


Control Protocol) scan that hackers both ethical and malicious - use to identify
listening TCP ports. In the right hands, a Null Scan can help identify potential holes
for server hardening, but in the wrong hands, it is a reconnaissance tool. It is a pre-
attack probe.

(iii) Firewall

It is a set of device (or) network that configured to permit or deny network


transmission based upon a set of rules.It creates a filter wall between a network
which is capable of filtering the authorised and unauthorised transmission and
connection.

Q.3 What is Trojan and advantages of Trojan?

A computer program that appears desirable but actually contains something


harmful.It may allow a hacker to remote access to a target computer.once it has been
installed on a target computer system, a hacker may have access to the computer
remotely and can performs various operations on that computer.
Main advantages of Trojan is that it can
not be easily track because of its separation in two phase as,
1. the injection of the malicious code
2. and the calling of the malicious code.

Q.4 Explain Buffer Overflows.

In computer security , a buffer overflow is an anomaly where a program, while


writing data to a buffer, overruns the buffer's boundary and overwrites adjacent
memory. Buffer overflows can be triggered by inputs that are designed to execute
code, or alter the way the program operates. This may result in erratic program
behavior, including memory access errors, incorrect results, a crash, or a breach of
system security. They are thus the basis of many software vulnerabilities and can be
maliciously exploited.

Q.5 Write a few line on SMS forging and VOIP server.

Voice over Internet Protocol is a method of communication protocols, and


transmission technologies for delivery of voice communications and multimedia
sessions over Internet Protocol (IP) networks, such as the Internet.

Q.6 What is meant by SQL?

Structured Query Language is a database computer language designed for


managing data in relational data base management system and originally based upon
relational algebra.

Q.7 Write a few lines about sniffing.

It is a computer program that can intercept and log traffic passing over a digital
network or part of a network.As data streams flow across the network, the sniffer
captures each packet and, if needed, decodes and analyzes its content according to
the appropriate remote function call.

Q.8 Write a few lines about e-mail tracking.


E-mail tracking is a method for monitoring the e-mail delivery to intended
recipient.It is very useful when the sender wants to know if the intended recipient
actually received the e-mail, or if they clicked the links.

Q.9 Why do you want to attend this workshop? (Statement of purpose, SOP)

I want to be more knowledgefull in the field of Hacking.And it will be my remarkable


day to attain this workshop in IITB campus.I want to interact and share my ideas with
the participants,deligates and reseachers from the various colleges/university.so this
workshop is an excellent platform for me.

Q.10 Where and how do you intend to use the knowledge gained at this workshop?

Though I am student of B.E first of all I will use it for my own to prevent from
unwanted uses of my computer.And later,when I will join any industry/company I will
use it for them for the same purpose.

You might also like