Question 6 of 144

A honey pot deployed with the IP 172.16.1.108 was compromised by an attacker. Given below is an excerpt from a Snort binary capture of the attack. Decipher the activity carried out by the attacker by studying the log. Please note that you are required to infer only what is explicit in the excerpt.

(Note: The student is being tested on concepts learnt during passive OS fingerprinting, basic TCP/IP connection concepts and the ability to read packet signatures from a sniff dump.)

03/15-20:21:24.107053 211.185.125.124:3500 -> 172.16.1.108:111

TCP TTL:43 TOS:0x0 ID:29726 IpLen:20 DgmLen:52 DF

***A**** Seq: 0x9B6338C5 Ack: 0x5820ADD0 Win: 0x7D78 TcpLen: 32

TCP Options (3) => NOP NOP TS: 23678634 2878772 =+=+=+=+=+=+=+=+=+=+=+=+=+=

+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=

03/15-20:21:24.452051 211.185.125.124:789 -> 172.16.1.103:111

UDP TTL:43 TOS:0x0 ID:29733 IpLen:20 DgmLen:84

Len: 64 -

01 0A 8A 0A 00 00 00 00 00 00 00 02 00 01 86 A0 . .............

00 00 00 02 00 00 00 03 00 00 00 00 00 00 00 00 ................

00 00 00 00 00 00 00 00 00 01 86 B8 00 00 00 01 . ..............

00 00 00 11 00 00 00 00 ........

=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=

03/15-20:21:24.730436 211.185.125.124:790 -> 172.16.1.103:32773

UDP TTL:43 TOS:0x0 ID:29781 IpLen:20 DgmLen:1104

Len: 1084 -

47 F7 9F 63 00 00 00 00 00 00 00 02 00 01 86 B8

    Correct Answer: A

    The logs show repeated connection attempts to port 111 on different IP addresses within the same subnet, which indicates the attacker was conducting a network sweep on port 111. Ports 111 and 32773 are commonly associated with network service enumeration, making it likely a network sweep was being performed to identify vulnerable systems.

Question 7 of 144

The newer Macintosh Operating System is based on:

    Correct Answer: B

    The newer Macintosh Operating System, known as macOS, is based on BSD Unix. BSD Unix is a Unix operating system derivative developed and distributed by the Computer Systems Research Group (CSRG) at the University of California, Berkeley. This forms the foundation for Darwin, which is the core set of components upon which macOS, iOS, watchOS, and tvOS are based.

Question 8 of 144

When examining a file with a Hex Editor, what space does the file header occupy?

    Correct Answer: B

    The file header is a section of data at the beginning of a file that contains specific information about the file's format, structure, and metadata. It provides essential details for interpreting and processing the file correctly. When examining a file using a Hex Editor, the file header typically occupies the first several bytes of the file.

Question 9 of 144

In the context of file deletion process, which of the following statement holds true?

    Correct Answer: C

    When files are deleted, the data itself is not immediately overwritten. Instead, the file system marks the corresponding clusters as available for new data. The likelihood of the deleted data being overwritten increases the longer the disk is in use, assuming new data is written to the disk. Secure delete programs ensure complete erasure by overwriting the data multiple times, not just in one go. However, temporary files created during the booting process can indeed interfere with evidence, making option C the most accurate statement in the context of file deletion processes.

Question 10 of 144

When examining the log files from a Windows IIS Web Server, how often is a new log file created?

    Correct Answer: B

    By default, a new log file is created every day on a Windows IIS Web Server. This is to ensure that the logs are manageable and to provide a clear daily record of the web server's activity. The log files typically include the date in their naming convention, allowing administrators to easily organize and review the logs by specific days.