Peter, a disgruntled ex-employee of Zapmaky Solutions Ltd., is trying to jeopardize the company's website http://zapmaky.com. He conducted the port scan of the
website by using the Nmap tool to extract the information about open ports and their corresponding services. While performing the scan, he recognized that some
of his requests are being blocked by the firewall deployed by the IT personnel of Zapmaky and he wants to bypass the same. For evading the firewall, he wanted to
employ the stealth scanning technique which is an incomplete TCP three-way handshake method that can effectively bypass the firewall rules and logging
mechanisms.
Which if the following Nmap commands should Peter execute to perform stealth scanning?
Richard, a penetration tester was asked to assess a web application. During the assessment, he discovered a file upload field where users can upload their profile
pictures. While scanning the page for vulnerabilities, Richard found a file upload exploit on the website. Richard wants to test the web application by uploading a
malicious PHP shell, but the web page denied the file upload. Trying to get around the security, Richard added the 'jpg' extension to the end of the file. The new file
name ended with '.php.jpg'. He then used the Burp suite tool and removed the 'jpg'' extension from the request while uploading the file. This enabled him to
successfully upload the PHP shell.
Which of the following techniques has Richard implemented to upload the PHP shell?
An organization has deployed a web application that uses encoding technique before transmitting the data over the Internet. This encoding technique helps the
organization to hide the confidential data such as user credentials, email attachments, etc. when in transit. This encoding technique takes 3 bytes of binary data and
divides it into four chunks of 6 bits. Each chunk is further encoded into respective printable character.
Identify the encoding technique employed by the organization?
During an internal network audit, you are asked to see if there is any RPC server running on the network and if found, enumerate the associate RPC services.
Which port would you scan to determine the RPC server and which command will you use to enumerate the RPC services?
The penetration testing team of MirTech Inc. identified the presence of various vulnerabilities in the web application coding. They prepared a detailed report
addressing to the web developers regarding the findings. In the report, the penetration testing team advised the web developers to avoid the use of dangerous
standard library functions. They also informed the web developers that the web application copies the data without checking whether it fits into the target destination
memory and is susceptible in supplying the application with large amount of data.
According to the findings by the penetration testing team, which type of attack was possible on the web application?
You have just completed a database security audit and writing the draft pen testing report.
Which of the following will you include in the recommendation section to enhance the security of the database server?
George, a freelance Security Auditor and Penetration Tester, was working on a pen testing assignment for Xsecurity. George is an ESCA certified professional and
was following the LPT methodology in performing a comprehensive security assessment of the company. After the initial reconnaissance, scanning and
enumeration phases, he successfully recovered a user password and was able to log on to a Linux machine located on the network. He was also able to access the
/etc/passwd file; however, the passwords were stored as a single "x" character.
What will George do to recover the actual encrypted passwords?
An attacker targeted to attack network switches of an organization to steal confidential information such as network subscriber information, passwords, etc. He
started transmitting data through one switch to another by creating and sending two 802.1Q tags, one for the attacking switch and the other for victim switch. By
sending these frames. The attacker is fooling the victim switch into thinking that the frame is intended for it. The target switch then forwards the frame to the victim
port.
Identify the type of attack being performed by the attacker?
Joe, an ECSA certified professional, is working on a pen testing engagement for one of his SME clients. He discovered the host file in one of the Windows
machines has the following entry:
213.65.172.55 microsoft.com
After performing a Whois lookup, Joe discovered the IP does not refer to Microsoft.com. The network admin denied modifying the host files.
Which type of attack does this scenario present?
Todd is working on an assignment involving auditing of a web service. The scanning phase reveals the web service is using an Oracle database server at the
backend. He wants to check the TNS Listener configuration file for configuration errors.
Which of the following directories contains the TNS Listener configuration file, by default: