exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 202 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 202
Topic #: 1
[All 312-50v12 Questions]

During a penetration testing assignment, a Certified Ethical Hacker (CEH) used a set of scanning tools to create a profile of the target organization. The CEH wanted to scan for live hosts, open ports, and services on a target network. He used Nmap for network inventory and Hping3 for network security auditing. However, he wanted to spoof IP addresses for anonymity during probing. Which command should the CEH use to perform this task?

  • A. Hping3 -1 10.0.0.25 -ICMP
  • B. Hping3 -2 10.0.0.25-p 80
  • C. Nmap -sS -Pn -n -vw --packet-trace -p- --script discovery -T4
  • D. Hping3 -S 192.168.1.1 -a 192.168.1.254 -p 22 --flood
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
e020fdc
1 month ago
Selected Answer: D
Chat GPT says D and breaks down the command: -S: Sends a SYN packet (used in TCP port scanning) 192.168.1.1: Target IP address -a 192.168.1.254: Spoofs the source IP address to appear as 192.168.1.254 -p 22: Target port (SSH in this case) --flood: Sends packets as fast as possible, useful in stress testing or noisy scans
upvoted 1 times
e020fdc
1 month ago
Reasons why the others are not correct: A. Hping3 -1 10.0.0.25 -ICMP Uses ICMP (-1), but the -ICMP flag is invalid. Also, it does not spoof IP addresses. B. Hping3 -2 10.0.0.25 -p 80 Uses UDP mode (-2) to port 80 (usually TCP), which is unusual and doesn’t spoof IP addresses. C. Nmap -sS -Pn -n -vw --packet-trace -p- --script discovery -T4 A detailed Nmap command for scanning all ports (-p-), disabling ping (-Pn), and including scripting. However, Nmap does not support IP spoofing in the same flexible way as Hping3. It can spoof MACs or perform decoy scans, but not raw IP spoofing like Hping3.
upvoted 1 times
...
...
qtygbapjpesdayazko
9 months, 3 weeks ago
Is D- "-a" is to spoof the IP 192.168.1.254
upvoted 2 times
...
JustAName
10 months, 1 week ago
Selected Answer: D
D "--flood" syntax is used for sphttps://www.examtopics.com/exams/eccouncil/312-50v12/view/41/#oofing ip address when performing scans
upvoted 2 times
...
xbsumz
10 months, 2 weeks ago
Im a bit hesitant about the effectiveness of this CEH technique
upvoted 1 times
...
insaniunt
10 months, 2 weeks ago
Selected Answer: D
D. Hping3 -S 192.168.1.1 -a 192.168.1.254 -p 22 --flood
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...