No45 after gaining initial low privilege access to a

This preview shows page 13 - 16 out of 46 pages.

NO.45After gaining initial low-privilege access to a Linux system, a penetration tester identifies aninteresting binary in a user's folder titled "changepass"-sr -xr -x 1 root root 6443 Oct 18 2017 /home/user/changepassUsing "strings" to print ASCII printable characters from changepass, the tester notes the following:$strings changepassExitsetuidstrmpGLINC _2.0ENV_PATH%s/changepwIT Certification Guaranteed, The Easy Way!13
mallocstrlenGiven this information, which of the following is the MOST likely path of exploitation to achieve rootprivileges on the machines?
NO.46A tester has captured a NetNTLMv2 hash using Responder Which of the following commandswill allow the tester to crack the hash using a mask attack?
NO.47Which of the following are MOST important when planning for an engagement? (SelectTWO).
NO.48A penetration tester is testing a banking application and uncovers a vulnerability. The tester islogged in as a non-privileged user who should have no access to any data. Given the data below fromthe web interception proxy Request POST /Bank/Tax/RTSdocuments/ HTTP 1.1 Host: test.comAccept: text/html; application/xhtml+xml Referrer: Cookie: PHPSESSIONID: ; Content-Type: application/form-data; Response403 Forbidden<tr><td> Error:</td></tr><tr><td> Insufficient Privileges to view the data. </td></tr>Displaying 1-10 of 105 recordsWhich of the following types of vulnerabilities is being exploited?A.Forced browsing vulnerabilityB.Parameter pollution vulnerability
IT Certification Guaranteed, The Easy Way!14
C.File upload vulnerabilityD.Cookie enumerationAnswer:A

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture