New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil ECSS Exam - Topic 4 Question 28 Discussion

Actual exam question for Eccouncil's ECSS exam
Question #: 28
Topic #: 4
[All ECSS Questions]

Firewalking is a technique that can be used to gather information about a remote network protected by a firewall. This technique can be used effectively to perform information gathering attacks. In this technique, an attacker sends a crafted packet with a TTL value that is set to expire one hop past the firewall. Which of the following are pre-requisites for an attacker to conduct firewalking?

Each correct answer represents a complete solution. Choose all that apply.

Show Suggested Answer Hide Answer
Suggested Answer: B, C, D

Contribute your Thoughts:

0/2000 characters
Letha
4 months ago
I thought firewalking was just a myth, but this makes sense!
upvoted 0 times
...
Craig
4 months ago
ICMP packets must be allowed, no doubt about it!
upvoted 0 times
...
Giovanna
4 months ago
Wait, do you really need a backdoor for this? Seems off.
upvoted 0 times
...
Robt
4 months ago
I think knowing the host IP is crucial too.
upvoted 0 times
...
Andrew
5 months ago
You definitely need the IP of the last gateway!
upvoted 0 times
...
Elden
5 months ago
I definitely recall that the TTL value is important, but I can't remember if the backdoor is necessary. I thought it was more about the gateway and ICMP rules.
upvoted 0 times
...
Alyce
5 months ago
I’m a bit confused about whether the attacker needs to know the IP of a host behind the firewall. It seems like it could help, but is it really a prerequisite?
upvoted 0 times
...
Sabina
5 months ago
I remember practicing a similar question where we discussed the importance of ICMP packets. I feel like they must be allowed for firewalking to work properly.
upvoted 0 times
...
Jesusa
5 months ago
I think knowing the IP address of the last known gateway is crucial for firewalking, but I'm not entirely sure about the backdoor part.
upvoted 0 times
...
Rodrigo
5 months ago
Hmm, the key seems to be finding the option that is compatible with the planned design decisions and minimizes the time for image and app updates. I'll need to weigh the pros and cons of each approach.
upvoted 0 times
...
Emile
5 months ago
I'm feeling pretty confident about this one. The key is that the legal advisors have stated it's probable that HJ will lose the $400,000 case and probable that they'll win the $250,000 case. So we need to provide for the $400,000 outflow and recognize the $250,000 inflow. Option B is the way to go.
upvoted 0 times
...
Izetta
5 months ago
Okay, let's see. Subscribing to articles, article versioning, and integration with social networking platforms all sound like standard Knowledge Management features. I'm guessing the answer is D, import from Microsoft Word.
upvoted 0 times
...

Save Cancel