I have some questions that i hope you can help me with and which i hope will be able to help others.. Was supposed to write my CEH exam on 16/07/07 but due to technical difficulties experienced by the testing centre i have been left in limbo.. but i am not complaining as it gives me more time to study..
1.) Is it possible to block/prevent attackers from running any sort of traceroute into your DMZ?
2.) Using a 802.11b wireless nic on your laptop with Netstumbler installed, you would like to scan an 802.11g network? Why is this not possible?
3) You are doing IP spoofing while you scan your target. You find that the target has port 23 open. Anyway you are unable to connect. Why?
4) I notice repeated probes to port 1080. I learn that the protocol being used is designed to allow the host outside of a firewall to connect transparently and securely through the firewall.what would be your inference of what is happening/happened? Could someone be using SOCKS on the network to communicate through the firewall?
Your help is most appreciatted and i hope that i can to oneday give back..