1. A connection would be established by which of the following uses of SSH that would serve as a network proxy for application layer? Suppose the victim-s IP to be 10. 2.3 and the attacker-s IP to be 10. 2.2.
A) ssh 10. 2.2 -R 8800:127.0.0.1:8080 B) ssh -D 8888 root@10. 2.3 C) ssh root@10. 2.3 D) ssh 10. 2.2 -L 8800:10. 2.2:80
2. According to the proxy connection described in the previous question, for a given application, the proxying of all network traffic across the SSH tunnel is facilitated by using which of the following tools?
A) Ncat B) Proxychains C) Burp Suite D) OWASP ZAP
3. An attacker is allowed to instantly re-establish encrypted communications with a target Linux system with minimal effort using which one of the following techniques?
A) A bound shell is set up via netcat or ncat in the command prompt and sent to the background B) Daily at noon, a netcat reverse shell is sent back to the attacker by configuring a cron job C) The attacking system-s public SSH key is installed into the target system. ssh/authorized_keys of the user D) A bound netcat shell is included by altering an existing start-up script in /etc/init.d any time the target system boots the availability of a shell ensured
4. Which tool was originally developed by University of Maryland and is a static code analyzer focused exclusively on Java language?
A) YASCA B) Findbugs C) AFL D) DynamoRIO
5. Select the achieving persistence method that relies on injecting malicious code into an existing application on the target system, that exploits the trust of an authorized user for that application?
A) New User Creation B) Daemon-based C) Scheduled Task Creation D) Trojan
1. Right Answer: B Explanation: The described tool is searchsploit. Searchsploit and its finer details should be of closer familiarization to Penetration testers as the ability to rapidly search for, identify and obtain exploit code is of great concern in a penetration test.
2. Right Answer: B Explanation: A dynamic proxy is established by using the -D flag in SSH; all of the network traffic of a penetration tester through port 8888 is proxied. Commands are run against systems that may be visible from the system but not from the attacker-s system. Much of a penetration tester-s ability is facilitated by this immensely powerful tool to pivot through networks and move deeper into a target organization-s network.
3. Right Answer: C Explanation: A penetration tester is enabled to proxy all network traffic by Proxychains through an established SOCKS proxy, like creating via SSH tunneling with the -D command.
4. Right Answer: B Explanation: A simple and effective way to ensure persistence of connectivity is by installing a public SSH key in a user-s authorized keys file, after a target system is compromised. By using SSH as a connection protocol, it is guaranteed that a penetration tester-s traffic is not only encrypted but also blends in with other legitimate users. In this process, a netcat listener is bound to port 4444.
5. Right Answer: D Explanation: Findbugs is a described tool that is currently known as Spotbugs. The University of Maryland developed Findbugs as a static code analyzer for Java applications, specifically. The spiritual successor of Findbugs, Spotbugs, can be taken to be a deprecated product updated in 2015. Spotbugs is in current development and has a very robust community in place.
Leave a comment