312-49v10 Exam QuestionsBrowse all questions from this exam

312-49v10 Exam - Question 7


A honey pot deployed with the IP 172.16.1.108 was compromised by an attacker. Given below is an excerpt from a Snort binary capture of the attack. Decipher the activity carried out by the attacker by studying the log. Please note that you are required to infer only what is explicit in the excerpt.

(Note: The student is being tested on concepts learnt during passive OS fingerprinting, basic TCP/IP connection concepts and the ability to read packet signatures from a sniff dump.)

03/15-20:21:24.107053 211.185.125.124:3500 -> 172.16.1.108:111

TCP TTL:43 TOS:0x0 ID:29726 IpLen:20 DgmLen:52 DF

***A**** Seq: 0x9B6338C5 Ack: 0x5820ADD0 Win: 0x7D78 TcpLen: 32

TCP Options (3) => NOP NOP TS: 23678634 2878772 =+=+=+=+=+=+=+=+=+=+=+=+=+=

+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=

03/15-20:21:24.452051 211.185.125.124:789 -> 172.16.1.103:111

UDP TTL:43 TOS:0x0 ID:29733 IpLen:20 DgmLen:84

Len: 64 -

01 0A 8A 0A 00 00 00 00 00 00 00 02 00 01 86 A0 . .............

00 00 00 02 00 00 00 03 00 00 00 00 00 00 00 00 ................

00 00 00 00 00 00 00 00 00 01 86 B8 00 00 00 01 . ..............

00 00 00 11 00 00 00 00 ........

=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=

03/15-20:21:24.730436 211.185.125.124:790 -> 172.16.1.103:32773

UDP TTL:43 TOS:0x0 ID:29781 IpLen:20 DgmLen:1104

Len: 1084 -

47 F7 9F 63 00 00 00 00 00 00 00 02 00 01 86 B8

Show Answer
Correct Answer: A

The attacker initiated connections to different IP addresses on port 111. Consistent with classical network sweep behavior, the entries show repeated access attempts to the same port at different addresses. No evidence indicates payloads associated with buffer overflow or backdoor installation in the provided log snippet.

Discussion

3 comments
Sign in to comment
bjornborgOption: B
Jun 4, 2023

The NOP and the data string tells me buffer overflow, so B is my answer

Malko59Option: A
Aug 4, 2023

I think A is correct. The attack starts with an initial network sweep on port 111. More information about this real case on: https://honeynet.onofri.org/scans/scan18/sol.html

4bd3116Option: D
Jul 16, 2024

The large packet sent to port 32773 indicates a possible exploitation attempt or backdoor installation.