Chap 10 - Exploiting Host Vulnerabilities Flashcards
Scott wants to crawl his penetration testing target’s website and then build a word list using the data he recovers to help with his password cracking efforts. Which of the following tools should he use?
A. DirBuster
B. CeWL
C. OLLY
D. Grep‐o‐matic
CeWL
The Customer Wordlist Generator, or CeWL, is a tool designed to spider a website and then build a word list using the files and web pages that it finds. The word list can then be used to help with password cracking.
CeWL
CeWL is a tool referred to as the “Custom Word List Generator.” It is a Ruby application that spiders websites to create wordlists based on the content it discovers, which can then be used in tasks such as password cracking
OLLY
OllyDbg is a Windows-specific debugger that operates at the assembly language level, making it suitable for reverse engineering and dynamic analysis of executable files
DirBuster
DirBuster is a Java application designed to brute-force directories and filenames on web servers, often used during penetration testing to discover hidden files and directories. Although it is included in the PenTest+ objectives, it has not been updated since 2013, and alternatives may be more practical in modern scenarios
Michelle wants to attack the underlying hypervisor for a virtual machine. What type of attack is most likely to be successful?
A. Container escape
B. Compromise the administrative interface
C. Hypervisor DoS
D. VM escape
Compromise the administrative interface
The most practical answer is to compromise the administrative interface for the underlying hypervisor. Although VM escape would be a useful tool, very few VM escape exploits have been discovered, and each has been quickly patched. That means that penetration testers can’t rely on one being available and unpatched when they encounter a VM host and should instead target administrative rights and access methods.
Jeff identifies the IP address contained in content delivery network (CDN) configuration for his target organization. He knows that that server’s content is replicated by the CDN, and that if he is able to conduct a denial‐of‐service attack on the host he will be able to take down his target’s web presence. What type of attack is Jeff preparing to conduct?
A. A side ‐channel attack
B. A direct‐to‐origin attack
C. A federation misconfiguration attack
D. A metadata service attack
A direct‐to‐origin attack
Jeff is preparing a direct‐to‐origin attack, which targets the underlying system or resource behind a load balancer, CDN, or other similar system. If he can create a denial‐of‐service condition, the front‐end network or systems will not have the ability to get updates or data from it, allowing him to bypass the protections and resilience a load balancer or content delivery network provides. A side‐channel attack in most cloud environments will focus on taking advantage of being on the same physical hardware. Federation misconfiguration attacks attempt to take advantage of an insecure configuration in the federation linkages between two organizations, and metadata service attacks leverage native services provided by cloud providers intended to allow easy queries about systems and running inside their environment such as hostnames, IP addresses, or other metadata about the instances.
Side‐channel attack
A Side-channel attack in cloud environments exploits the shared hardware of virtualized systems. Attackers leverage shared resources or vulnerabilities in virtualization to capture information without directly compromising the target system.
For example, resizing virtual drives can leave remnant data exposed, though modern cloud providers mitigate this risk with encryption
D2O
A Direct-to-Origin (D2O) Attack is a type of distributed denial-of-service (DDoS) attack that bypasses content delivery networks (CDNs) or similar protections to directly target the original service infrastructure.
By discovering the service’s real IP address, attackers can exploit its lesser scalability or protection, effectively negating the benefits of the CDN
Federation misconfiguration attack
A Federation Misconfiguration Attack targets vulnerabilities in the federation services that enable organizations to share authentication and authorization data.
Misconfigurations in these systems, such as Active Directory Federation Services (ADFS), can lead to unauthorized access or data leakage due to excessive trust or improperly secured connections between on-premise and cloud environments like Azure
Metadata service attack
A Metadata Service Attack exploits cloud service metadata APIs, which are intended to provide details such as temporary credentials or configuration information for cloud instances.
In AWS, for example, attackers might access the metadata service to retrieve temporary credentials for APIs like S3, potentially escalating access to other services or sensitive data
Claire knows that her target organization leverages a significant number of IoT devices and that she is likely to need to use one or more of them as pivot points for her penetration test. Which of the following is not a common concern when conducting a penetration test involving IoT devices?
A. Impacts to availability
B. Fragile environments
C. Data leakage
D. Data corruption
Data leakage
Although IoT devices may leak data due to the use of insecure protocols or data storage, that’s a concern for the defender. Pentesters should actively be looking for that sort of opportunity! Claire knows that IoT devices may fail when scanned or compromised, and that this can cause issues. They may also be part of a fragile environment that may not be designed to handle scans, or where delayed responses or downtime may cause issues for her client. She also knows that data corruption may occur if devices are not behaving properly due to a penetration test and that in environments where IoT data is critical that this could be a real issue. Claire should carefully discuss this with her client and ensure that they understand the risks and how to constrain them if testing IoT devices is important to the pentest.
Susan wants to use a web application vulnerability scanner to help map an organization’s web presence and to identify existing vulnerabilities. Which of the following tools is best suited to her needs?
A. Paros
B. CUSpider
C. Patator
D. w3af
w3af
The Web Application Attack and Audit Framework (w3af) is a web application testing and exploit tool that can spider the site and test applications and other security issues that may exist there. The Paros proxy is an excellent web proxy tool often used by web application testers, but it isn’t a full‐fledged testing suite like w3af. CUSpider and other versions of Spider are tools used to find sensitive data on systems, and Patator is a brute‐force tool.
Paros
Paros is a web proxy tool often used by penetration testers for evaluating web applications. It enables users to intercept, manipulate, and analyze HTTP requests and responses, but it is not a comprehensive testing suite like w3af
Patator
Patator is a brute-forcing tool that supports a variety of protocols and services. It is less user-friendly compared to Hydra or Medusa because it requires more manual filtering based on result codes, but it provides unique features that can be advantageous in specific testing scenarios.
w3af
w3af is a web application attack and audit framework. It is used as a tool during penetration testing to identify vulnerabilities in web applications, allowing testers to exploit and analyze them for security weaknesses. Its functionalities include both vulnerability detection and attack simulation.
Madhuri has discovered that the organization she is conducting a penetration test against makes extensive use of industrial control systems to manage a manufacturing plant. Which of the following components is least likely to respond to her normal penetration testing tools like Nmap and Metasploit?
A. RTUs
B. Field devices
C. PLCs
D. Master stations
Field devices
Field devices are controlled by remote terminal units (RTUs) or programmable logic controllers (PLCs), which are likely to connect to a network and accept commands from a master station or operator station. Field devices are often controlled via digital or analog commands from the RTUs and PLCs, and are thus not likely to use protocols or access methods that are supported by normal penetration testing tools.
RTUs
An RTU, or Remote Terminal Unit, is a device used in SCADA (Supervisory Control and Data Acquisition) systems. RTUs collect data from sensors and other devices and transmit it to a central system for monitoring and control. They are a key component in automating and managing industrial processes
Field Devices
Field devices refer to sensors, actuators, and similar components in industrial control systems (ICS) that are controlled by RTUs (Remote Terminal Units) or PLCs (Programmable Logic Controllers).
These devices often operate using analog or digital signals and may not use standard protocols compatible with typical penetration testing tools
PLCs
PLCs, or Programmable Logic Controllers, are specialized industrial computers used in automation to control machinery and processes. They are integral components of Industrial Control Systems (ICS) and are commonly employed in manufacturing, utilities, and other industrial environments.
PLCs execute specific control tasks based on input from field devices such as sensors and output to actuators