14 1 Flashcards

1
Q

___ - file that controls what and where facilities are logged. If remote logging is set, ‘@loghost’ syntax will be present

A

/etc/syslog.conf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Unix/Linux Rootkits:
___ - Replaces system application with rooted system files (ls, find, ps, netstat, login, and passwd commands) and inetd daemon services.

A

User-Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

unix/linux syntax:
___ - outputs full, long list of active processes.
___ - prints current running processes
___ - prints processes in full list

A

ps

  • e
  • f
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

___ - this file is referenced for hostname resolution.

A

/etc/hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Unix/Linux Shell History File:

___ - History file is located in user’s home directory as .bash_history.

A

Bourne Again Shell (bash)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

unix/linux syntax:
___ - (solaris only) displays information on all users (logged in or not) and system accounts. Output contains user, UID, group name, GUID, and comments.

A

logins

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

unix/linux syntax:
___ - prints network connections.
options:
___ - displays routing information
___ - displays IP instead of interface
___ - displays connections/listening ports
___ - display associated PID for connections/ports

A

netstat

  • r
  • n
  • a
  • o
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Overwrite the file with nothing, thereby clearing out all history file content. syntax = ___

A

echo “” .bash_history

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

unix/linux syntax:

___ - displays logged in username, terminal, login time, and where user is logged in from.

A

who

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Tool to be used to conceal files within target system.

A

touch -t

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

System Change Logs:

___ - searches inside text files for matching patterns.

A

grep

-v

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

unix/linux syntax:
___ - manages job scheduling with cron jobs.
___ - edit job
___ - list jobs

A

crontab

  • e
  • l
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Unix/Linux Shell History File:

___ - No history file supported. Ideal shell; nothing is recorded or needs to be cleaned.

A

Bourne Shell (sh)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

unix/linux syntax:
___ - searches for files across the filesystem.
___ - filename to search for
___ - type of file
___ - modified file time range in minutes

A

find

  • name
  • type
  • mmin
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Syntax; Unset history file variable in a bash shell.

A

unset HISTFILE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Unix/Linux Rootkits:

___ - Modifies or replaces firmware to hide below the OS. Very hard to detect. Gets started before the OS.

A

Firmware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

unix/linux syntax:
___ - provides interactive monitoring of active processes on UNIX OSs. In Linux, ‘top’ provides the same output.
___ - print info about processes and users

A

prstat

-a

18
Q

Syntax; Clear the history file in a bash shell.

A

history -c

19
Q

command to use the unreal exploit

A

use exploit/unix/irc/unreal_ircd_3281_backdoor

20
Q

unix/linux syntax:

___ - prints ARP cache.

A

arp

21
Q

Unix/Linux Rootkits:

___ - Exploits functionality of Loadable Kernel Module (LKM) to hide itself below the Application Layer.

A

Kernel-Mode

22
Q

System Change Logs:

The ___ or ___ can be used to edit plaintext files.

A

vi editor
or
grep

23
Q

The ___ module exploits a buffer overflow vulnerability in the adm_build_path() function of sadmind.

A

sadmind_adm_build_path

24
Q

unix/linux syntax:
___ - Display processor (type,processor,chip) info
___ - verbose mode, extra info

A

psrinfo

-v

25
Q

unix/linux syntax:
___ - displays all system hardware and software revision info
___ - print only patch revision info

A

showrev

-p

26
Q

unix/linux syntax:

___ - displays summary of system and user activity.

A

w

27
Q

___ removes user’s last entry from WTMP, UTMP, LASTLOG, WTMPX, and UTMPX files. ___ attempts to remove a username from all possible files and binaries.

A

ZAP3

28
Q

unix/linux syntax:
___ - displays software package information
___ - list in long format

A

pkginfo

-l

29
Q

unix/linux syntax:
___ - display amount of disk space by file system
___ - prints block sizes

A

df

-k

30
Q

ZAP3:

___ - uses /var/adm/wtmpx to display login/logout and system boot info; most recent entry at top.

A

last

31
Q

unix/linux syntax:
___ - display current system information
___ - prints all system info

A

uname

-a

32
Q

unix/linux syntax:
___ - (solaris only) displays logged in username, active process/CPU time owned by user, login time, machine name, and time of day.

A

whodo

33
Q

___ are software programs and files designed to provide continued unauthorized root access to a system and hide any evidence of compromise.

A

Rootkits

34
Q

Command to use the sadmind exploit

A

use exploit/solaris/sunrpc/sadmind_adm_build_path

35
Q

Unix/Linux Enumeration:
___ - Displays logged in users information.
option:
___ - displays in long list format

A

finger

-l

36
Q

Unix/Linus Enumeration:
___ - Displays logged in user information (similar to finger)
___ - display in long list format

A

rusers

-l

37
Q

Unix/Linux Enumeration:
___ - Display target host RPC services by program, transport, service name, and owner.
option:
___ - Display associated port numbers.

A

rpcinfo

-p

38
Q

Unix/Linux Enumeration:
___ - Displays a target hosts NFS exported file system.
option:
___ - Prints the list of shared file systems.

A

showmount

-e

39
Q

___ (aka port forwarding) is the encapsulation of data for transmission through a network.

A

Tunneling

40
Q

Tunnel Types:
___ tunnel opens a port on the AP and sends data through the redirector (pivot), who then sends it to the targets vulnerable port.

A

Forward tunnel

41
Q

Tunnel Types:

___ tunnel opens a port on the redirector (pivot) and returns data to the AP.

A

Reverse tunnel