A. IAM
B. Block storage
C. Virtual private cloud
D. Metadata services
A. Use steganography and send the file over FTP
B. Compress the file and send it using TFTP
C. Split the file in tiny pieces and send it over dnscat
D. Encrypt and send the file over HTTPS
A. Kiosk escape
B. Arbitrary code execution
C. Process hollowing
D. Library injection
A. Latches
B. Pins
C. Shackle
D. Plug
A. IAST
B. SBOM
C. DAST
D. SAST
A. Run scripts to terminate the implant on affected hosts.
B. Spin down the C2 listeners.
C. Restore the firewall settings of the original affected hosts.
D. Exit from C2 listener active sessions.
A penetration tester is conducting reconnaissance on a target network. The tester runs the following Nmap command: nmap -sv -sT -p - 192.168.1.0/24. Which of the following describes the most likely purpose of this scan?
A. OS fingerprinting
B. Attack path mapping
C. Service discovery
D. User enumeration
A penetration tester gains access to a Windows machine and wants to further enumerate users with native operating system credentials. Which of the following should the tester use?
A. route.exe print
B. netstat.exe -ntp
C. net.exe commands
D. strings.exe -a
A. curl <url>?param=http://169.254.169.254/latest/meta-data/
B. curl '<url>?param=http://127.0.0.1/etc/passwd'
C. curl '<url>?param=<script>alert(1)<script>/'
D. curl <url>?param=http://127.0.0.1/
A. Cryptographic flaws
B. Protocol scanning
C. Cached pages
D. Job boards
1 #!/bin/bash
2 for i in {1..254}; do
3 ping -c1 192.168.1.$i
4 done
The tester executes the script, but it fails with the following error:
-bash: syntax error near unexpected token `ping'
Which of the following should the tester do to fix the error?
A. Add do after line 2.
B. Replace {1..254} with $(seq 1 254).
C. Replace bash with tsh.
D. Replace $i with ${i}.
Explanation:
The error in the script is due to a missing do keyword in the for loop. Here’s the corrected script and explanation:
Original Script:
1 #!/bin/bash
2 for i in {1..254}; do
3 ping -c1 192.168.1.$i
4 done
Error Explanation:
The for loop syntax in Bash requires the do keyword to indicate the start of the loop's body.
Corrected Script:
1 #!/bin/bash
2 for i in {1..254}; do
3 ping -c1 192.168.1.$i
4 done
Adding do after line 2 corrects the syntax error and allows the script to execute properly.
A penetration tester cannot find information on the target company's systems using common OSINT methods. The tester's attempts to do reconnaissance against internet-facing resources have been blocked by the company's WAF. Which of the following is the best way to avoid the WAF and gather information about the target company's systems?
A. HTML scraping
B. Code repository scanning
C. Directory enumeration
D. Port scanning
Explanation:
When traditional reconnaissance methods are blocked, scanning code repositories is an effective method to gather information.
Here’s why:
Code Repository Scanning:
Leaked Information:
Code repositories (e.g., GitHub, GitLab) often contain sensitive information, including API keys, configuration files, and even credentials that developers might inadvertently commit.
Accessible:
These repositories can often be accessed publicly, bypassing traditional defenses like WAFs.
Comparison with Other Methods:
HTML Scraping:
Limited to the data present on web pages and can still be blocked by WAF.
Directory Enumeration:
Likely to be blocked by WAF as well and might not yield significant internal information.
Port Scanning:
Also likely to be blocked or trigger alerts on WAF or IDS/IPS systems.
Scanning code repositories allows gathering a wide range of information that can be critical for further penetration testing effort
Page 1 out of 8 Pages |