PrepAway - Latest Free Exam Questions & Answers

what is the attacker ultimately trying to achieve as inferred from the log sequence?

After studying the following log entries, what is the attacker ultimately trying to achieve as inferred from the log sequence?

1. mkdir -p /etc/X11/applnk/Internet/.etc
2. mkdir -p /etc/X11/applnk/Internet/.etcpasswd
3. touch -acmr /etc/passwd /etc/X11/applnk/Internet/.etcpasswd
4. touch -acmr /etc /etc/X11/applnk/Internet/.etc
5. passwd nobody -d
6. /usr/sbin/adduser dns -d/bin -u 0 -g 0 -s/bin/bash
7. passwd dns -d
8. touch -acmr /etc/X11/applnk/Internet/.etcpasswd /etc/passwd
9. touch -acmr /etc/X11/applnk/Internet/.etc /etc

PrepAway - Latest Free Exam Questions & Answers

A.
Change password of user nobody

B.
Extract information from a local directory

C.
Change the files Modification Access Creation times

D.
Download rootkits and passwords into a new directory

Explanation:
:

4 Comments on “what is the attacker ultimately trying to achieve as inferred from the log sequence?

  1. Satshop says:

    I was very pleased to find your website.I wanted to thanks for your time for this nice article!!

    I definitely enjoying every little bit of it and I have you bookmarked to check out new stuff you blog post.

    Best regards Alex

    1. Guest says:

      -d is to delete password. That will make user “nobody” password less. C is correct as touch is used to change time stamp also. Option details are given below

      -a Change only the access time.
      -c, –no-create Do not create any files.
      -m Change only the modification time.
      -r, –reference=FILE Use this FILE’s times instead of current time.

      Regards,


Leave a Reply