180k views
1 vote
A company is concerned about disgruntled employees transferring its intellectual property data through covert channels.

Which of the following tools would allow employees to write data into ICMP echo response packets?

A. Thor
B. Jack the Ripper
C. Burp Suite
D. Loki

User ZooZ
by
7.6k points

1 Answer

6 votes

Final answer:

Thor is the tool that allows employees to write data into ICMP echo response packets.

Loki is the tool that allows for writing data into ICMP echo response packets, and is used for covert data exfiltration. It uses ICMP to transfer data in a manner that might evade detection. The other tools listed do not serve this purpose.

Step-by-step explanation:

The tool that would allow employees to write data into ICMP echo response packets is Thor. Thor is a command line tool that can be used to send ICMP packets and receive the echo replies. By manipulating the payload of the ICMP echo request packets, employees can write data into the ICMP echo response packets. This covert channel can be used to transfer intellectual property data.

Loki is the tool that allows for writing data into ICMP echo response packets, and is used for covert data exfiltration. It uses ICMP to transfer data in a manner that might evade detection. The other tools listed do not serve this purpose.

The question relates to the methodologies that disgruntled employees might use to exfiltrate intellectual property data using covert channels. Of the given tools - Thor, Jack the Ripper, Burp Suite, and Loki - the one that would allow employees to write data into ICMP echo response packets is Loki.

Loki is a tool designed for covert data exfiltration. It can take advantage of various protocols, including ICMP, to send data out of a network in a way that may evade detection. Since ICMP is commonly used for diagnostic purposes, it's less likely to be blocked by firewalls, making it an effective channel for transferring data covertly.

None of the other tools listed (Thor, Jack the Ripper, and Burp Suite) are designed for this purpose. Jack the Ripper is for password cracking, Burp Suite for web vulnerability scanning, and Thor typically refers to cybersecurity software that focuses on proactive and reactive security measures rather than data exfiltration.

User Scott Leonard
by
7.5k points