Which of the following options would be your current privileges?
You have successfully run a buffer overflow attack against a default IIS installation running on a
Windows 2000 Server. The server allows you to spawn a shell. In order to perform the actions
you intend to do, you need elevated permission. You need to know what your current privileges
are within the shell. Which of the following options would be your current privileges?
which holds the least risk of detection?
You wish to determine the operating system and type of web server being used. At the same time
you wish to arouse no suspicion within the target organization.
While some of the methods listed below work, which holds the least risk of detection?
Which of the following tools can be used for that purpose?
Bart is looking for a Windows NT/2000/XP command-line tool that can be used to assign, display,
or modify ACL’s (access control lists) to files or folders and also one that can be used within batch
files.
Which of the following tools can be used for that purpose? (Choose the best answer)
Which of the following buffer overflow exploits are related to Microsoft IIS web server?
Which of the following buffer overflow exploits are related to Microsoft IIS web server? (Choose
three)
which privilege does the web server software execute?
On a default installation of Microsoft IIS web server, under which privilege does the web server
software execute?
How can this help you in footprint the organization?
You are gathering competitive intelligence on XYZ.com. You notice that they have jobs listed on a
few Internet job-hunting sites. There are two job postings for network and system administrators.
How can this help you in footprint the organization?
What are the three phases involved in security testing?
What are the three phases involved in security testing?
How can you retrieve information from the outdated website?
You visit a website to retrieve the listing of a company’s staff members. But you can not find it on
the website. You know the listing was certainly present one year before. How can you retrieve
information from the outdated website?
Which of the processes listed below would be a more efficient way of doing this type of validation?
You work as security technician at XYZ.com. While doing web application testing, you might be
required to look through multiple web pages online which can take a long time. Which of the
processes listed below would be a more efficient way of doing this type of validation?
By examining the packet identify the name and version of the Web server?
This packet was taken from a packet sniffer that monitors a Web server.
This packet was originally 1514 bytes long, but only the first 512 bytes are shown here. This is the
standard hexdump representation of a network packet, before being decoded. A hexdump has
three columns: the offset of each line, the hexadecimal data, and the ASCII equivalent. This
packet contains a 14-byte Ethernet header, a 20-byte IP header, a 20-byte TCP header, an HTTP
header ending in two line-feeds (0D 0A 0D 0A) and then the data. By examining the packet
identify the name and version of the Web server?