test3 Flashcards
When would a penetration tester need to use a privilege escalation attack?
When they gain access to a shell but it isn’t root or admin.
If you had the ability to overwrite any file on a Linux system, which one would be the easiest to overwrite to gain root-level privileges?
Etc/shadow
When performing a penetration test, what can you offer your clients far beyond simple Nessus and pentest puppy mills?
Give them actionable feedback that will help them feel more secure.
How can history files be used for privilege escalation attacks?
Passwords, secret files, and other hosts can be caught in command history.
Who is Trevor the Roach? On what day was Trevor murdered?
A roach was sucked up through a straw and died, became famous on Twitter. Sept 23, 2017.
What does sudo allow you to do on a Linux host?
It allows you run commands as either root or a privileged user that has been configured.
What should you include in your penetrating testing reports to help your audience understand the risks you are attempting to communicate?
Visuals and images help drill your point home
What is a cron job?
Does regularly scheduled actions like backups or report generation.
What is the full command you can use on a Linux host to find any SUID / SGID program (any program with the SUID or SGID bits sets)?
Find / -perm -4000 -o -perm -2000
What does the ltrace command do?
Calls and searches for libraries.
What are two privilege escalation techniques that can be used to get full administrative access on most Windows systems?
DLL Hijacking by inserting a DLL in a path and Windows will run it. Missing DLLs when a DLL tries to load and nothing is there, the code takes another path.
- What tool can be used to find phantom or ghost DLLs?
Process Monitor
What port is ssh and what is the correct way to sign in via ssh?
Port 22
ssh (username)@(ip)
input password
How to find the kernel version on linux?
uname -r
How to load just the server headers on curl?
curl -i
What is Hydra and what are some commands for it?
Hydra is a password cracking tool.
-L (text file of usernames) -P (password list) ssh://(ip) ftp://(ip):(port)
John the Ripper? and commands
Password cracker
john file.txt
john –show –format=Raw-SHA1 file.txt
What are some common nmap switches?
-sC is a script scan -sV is a version scan
-Pn is ping sweep -p- pings all ips