Which of the following is the successor of SSL?
Which of the following is the successor of SSL?
XOR the following binary values: 10110001 00111010
A common cryptographical tool is the use of XOR. XOR the following binary values:
10110001
00111010
which the current user context has access?
Using Windows CMD, how would an attacker list all the shares to which the current user context has access?
What is the Shellshock bash vulnerability attempting to…
env x=`(){ :;};echo exploit` bash -c ‘cat /etc/passwd’
What is the Shellshock bash vulnerability attempting to do on an vulnerable Linux host?
what would you do first?
After trying multiple exploits, you’ve gained root access to a Centos 6 server. To ensure you maintain access,
what would you do first?
Which file does the attacker need to modify?
An attacker has installed a RAT on a host. The attacker wants to ensure that when a user attempts to go to
“www.MyPersonalBank.com”, that the user is directed to a phishing site.
Which file does the attacker need to modify?
Which Linux based tool has the ability to change any us…
You’ve gained physical access to a Windows 2008 R2 server which has an accessible disc drive. When you
attempt to boot the server and log in, you are unable to guess the password. In your tool kit you have an Ubuntu
9.10 Linux LiveCD. Which Linux based tool has the ability to change any user’s password or to activate
disabled Windows accounts?
What just happened?
Jimmy is standing outside a secure entrance to a facility. He is pretending to have a tense conversation on his
cell phone as an authorized employee badges in. Jimmy, while still on the phone, grabs the door as it begins to
close.
What just happened?
What type of firewall is inspecting outbound traffic?
During a blackbox pen test you attempt to pass IRC traffic over port 80/TCP from a compromised web enabled
host. The traffic gets blocked; however, outbound HTTP traffic is unimpeded.
What type of firewall is inspecting outbound traffic?
What should you do next?
Perspective clients want to see sample reports from previous penetration tests.
What should you do next?