Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam 312-50v11 topic 1 question 28 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 28
Topic #: 1
[All 312-50v11 Questions]

Session splicing is an IDS evasion technique in which an attacker delivers data in multiple, small sized packets to the target computer, making it very difficult for an IDS to detect the attack signatures. Which tool can be used to perform session splicing attacks?

  • A. tcpsplice
  • B. Burp
  • C. Hydra
  • D. Whisker
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
alodha100
1 month, 2 weeks ago
session splicing is also packet fragmentation. Whisker is the correct answer.
upvoted 1 times
...
ostorgaf
8 months ago
Selected Answer: D
Whisker is a tool that can be used to perform session splicing attacks. It is a security assessment tool that was designed to identify vulnerabilities in web applications. Whisker can manipulate the order of HTTP requests and responses to evade detection by intrusion detection systems (IDS) and web application firewalls (WAFs). This makes it an effective tool for carrying out session splicing attacks by fragmenting attack data and distributing it across different packets.
upvoted 1 times
...
Daniel8660
1 year, 6 months ago
Selected Answer: D
Intrusion detection system evasion techniques(WIKI) One basic technique is to split the attack payload into multiple small packets, so that the IDS must reassemble the packet stream to detect the attack. The 'whisker' evasion tool calls crafting packets with small payloads 'session splicing'. https://en.wikipedia.org/wiki/Intrusion_detection_system_evasion_techniques
upvoted 4 times
...
gogo78
2 years, 2 months ago
A simple way of splitting packets is by fragmenting them, but an adversary can also simply craft packets with small payloads.[1] The 'whisker' evasion tool calls crafting packets with small payloads 'session splicing'. https://en.wikipedia.org/wiki/Intrusion_detection_system_evasion_techniques
upvoted 4 times
...
Novmejst
2 years, 4 months ago
D. Whisker - ... Many web vulnerability scanners, such as 'Nikto', 'whisker' and 'Sandcat', also incorporate IDS evasion techniques ...
upvoted 1 times
...
V1S3
2 years, 6 months ago
No, answer is whisker. It was a tool back in the early 2000s, after that libwhisker became a core component in Nikto.
upvoted 3 times
...
dolumo
2 years, 11 months ago
One basic technique is to split the attack payload into multiple small packets, so that the IDS must reassemble the packet stream to detect the attack. A simple way of splitting packets is by fragmenting them, but an adversary can also simply craft packets with small payloads. The ‘whisker’ evasion tool calls crafting packets with small payloads ‘session splicing’. References: https://en.wikipedia.org/wiki/Intrusion_detection_system_evasion_techniques#Fragmentation_and_small_packets
upvoted 3 times
...
_Storm_
3 years ago
from OWASP Whisker’s Session Splicing  Network level attack  Not the same as IP fragmentation  Send parts of the request in different packets "GET / HTTP/1.0" may be split across multiple packets to be "GE", "T ", "/", " H", "T", "TP", "/1", ".0
upvoted 3 times
...
americaman80
3 years ago
D is correct
upvoted 3 times
...
kidneysmasher
3 years ago
Explanation/Reference: One basic technique is to split the attack payload into multiple small packets, so that the IDS must reassemble the packet stream to detect the attack. A simple way of splitting packets is by fragmenting them, but an adversary can also simply craft packets with small payloads. The ‘whisker’ evasion tool calls crafting packets with small payloads ‘session splicing’. References: https://en.wikipedia.org/wiki/Intrusion_detection_system_evasion_techniques#Fragmentation_and_small_packets
upvoted 1 times
...
sam422
3 years ago
I go with Answer A, Hydra is password cracker, burp suite vulnerability scanner , whisker is vulnerability scanner
upvoted 1 times
Silascarter
2 years, 5 months ago
Do you have Google?
upvoted 3 times
...
study_Somuch
2 years, 8 months ago
Agreed
upvoted 1 times
GSEC_FANATIC
2 years, 7 months ago
We disagree
upvoted 5 times
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...