Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

A _____ is the one who gains access to systems with a view to fixing identified weaknesses a. Black hat hacker b. Gray hat hacker

  1. A _____ is the one who gains access to systems with a view to fixing identified weaknesses

a. Black hat hacker

b. Gray hat hacker

c.Script kiddies

d. White hat hacker

  1. In victim machine 1, after getting the ssh login, which command was used to get the version of the operating system of the victim machine

a. id

b. uname -a

c. searchsploit

d. whoami

  1. The -O switch in the Nmap commands you ran in this lab (for example, nmap -O -v 10.20.100.50) instructed Nmap to

a. Detect the service of the machine

b. Detect the operating system of the machine

  1. You run the following command nmap -p21,80,443 -sV -O 45.33.32.156 What is the most likely partial output?

a. The host is up (0.029s latency), Not shown: 992 closed ports PORT STATE SERVICE

22/tcp open ssh

25/tcp filtered smtp

80/tcp open http

135/tcp filtered msrpc

443/tcp filtered https

b. The host is up (0.029s latency), PORT STATE SERVICE VERSION

21/tcp closed ftp

80/tcp open http Apache httpd 2.4.7 ((Ubuntu))

443/tcp filtered https

c. The host is up (0.029s latency). PORT STATE SERVICE VERSION

21/tcp closed ftp

80/tcp open http Apache httpd 2.4.7 ((Ubuntu))

443/tcp filtered https

Device type: general purpose|firewall|router|broadband router|WAP|terminal

Running: Linux 3.X|2.6.X|2.4.X Network Distance: 12 hops

d. The host is up (0.029s latency). PORT STATE SERVICE

21/tcp closed ftp

80/tcp open http

443/tcp filtered https

  1. While solving Victim Machine 1, which command was used to show the current user.

a. who

b. whoami

c. Lsgroup

d. Id

  1. The ____ is an ultimate archive of exploits and vulnerable software. This was used to search for a suitable exploit for privilege escalation in Victim Machine 1.

a. Exploit Database (exploitdb)

b. Metasploit

c. Rapid 7

d. Maltego

  1. Which statement is true about bind shells:

a. A bind shell instructs the target machine to open a shell command and listen on a local port

b. A bind shell actively pushes a connection back to the attack machine rather than waiting for an incoming connection

c. A bind shell is a shell session established on a connection that is initiated from a remote machine, not from the localhost

d. Attackers who successfully exploit a remote command execution vulnerability can use a bind shell to obtain an interactive shell session on the target machine and continue their attack

  1. You are asked to start an apache2 service. What would be the correct the command for it?

a. service apache2 start

b. apache2 service start

c. service start apache2

d. start service apache2

  1. You want to open an ftp connection as a user named john on 192.168.37.198. What would be the correct command do

a. ftp john@192.168.37.198

b. john@192.168.37.198 ftp

c. 192.168.37.198@john ftp

  1. You want to determine which hosts are reachable on a network and one of the below bash script will help you scan the local network that sends ICMP messages to remote systems to see if they respond. Select the correct answer

a. Ifconfig

b. Arp-scan

c. Ping

d. Netdiscover

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Hands-On Database

Authors: Steve Conger

2nd Edition

0133024415, 978-0133024418

More Books

Students also viewed these Databases questions

Question

1. Explain why evaluation is important.

Answered: 1 week ago