Question 78 a penetration tester wants to launch a

This preview shows page 34 - 36 out of 39 pages.

QUESTION: 78 A penetration tester wants to launch a graphic console window from a remotely compromised host with IP 10.0.0.20 and display the terminal on the local computer with IP 192.168.1.10. Which of the following would accomplish this task? A. From the remote computer, run the following commands: Export IHOST 192.168.1.10:0.0 xhost+ Terminal B. From the local computer, run the following command ssh -L4444 : 127.0.01:6000 -% [email protected] xterm C. From the local computer, run the following command ssh -r6000 : 127.0.01:4444 -p 6000 [email protected] “xhost+; xterm” D. From the local computer, run the following command Nc -1 -p 6000 Then, from the remote computer, run the following command Xterm | nc 192.168.1.10 6000 Answer: A
QUESTION: 79 A penetration tester is performing a black box assessment on a web-based banking application. The tester was only provided with a URL to the login page. Give the below code and output Import requests from BeautifulSoup import BeautifulSoup request = requests.get (“”) respHeaders, respBody = request[0]. Request[1] if respHeader.statuscode == 200: soup = BeautifulSoup (respBody) soup = soup.FindAll (“div”, (“type” : “hidden”)) print respHeader. StatusCode, StatusMessage else: print respHeader. StatusCode, StatusMessage Output: 200 OK Which of the following is the tester intending to do?
CompTIA PT0-001 A. Horizontally escalate privileges B. Scrape the page for hidden fields C. Analyze HTTP respond code D. Search for HTTP headers Answer: B QUESTION: 80 After gaining initial low-privilege access to a Linux system, a penetration tester identifies an interesting binary in a user’s folder titled “changepass” -sr –xr -x 1 root root 6443 Oct 18 2017 /home/user/changepass Using “strings” to print ASCII printable characters from changepass, the tester notes the following: $ strings changepass Exit setuid strmp GLINC _2.0 ENV_PATH %s/changepw malloc strlen Given this information, which of the following is the MOST likely path of explogtation to achieve root privileges on the machines?
“Best Material, Great Results”. 35

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture