Which flag in hping3 would you use to collect the TCP sequence numbers generated by the target?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which flag in hping3 would you use to collect the TCP sequence numbers generated by the target?

Explanation:
Collecting the target’s TCP sequence numbers relies on displaying the sequence field from the packets that come back. The flag that makes hping3 show those sequence numbers in the output is the one that instructs the tool to report the TCP sequence numbers from replies. Using that flag directly surfaces the ISN and subsequent sequence values, which is exactly what you need for this task. Other options alter what you send or what you display, but they don’t reveal the sequence numbers. For example, sending a packet with the SYN flag changes how the target replies but doesn’t automatically print the sequence values; requesting TCP timestamps, on the other hand, would show timestamp data instead of the sequence numbers.

Collecting the target’s TCP sequence numbers relies on displaying the sequence field from the packets that come back. The flag that makes hping3 show those sequence numbers in the output is the one that instructs the tool to report the TCP sequence numbers from replies. Using that flag directly surfaces the ISN and subsequent sequence values, which is exactly what you need for this task.

Other options alter what you send or what you display, but they don’t reveal the sequence numbers. For example, sending a packet with the SYN flag changes how the target replies but doesn’t automatically print the sequence values; requesting TCP timestamps, on the other hand, would show timestamp data instead of the sequence numbers.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy