ExamGecko
Question list
Search
Search

Related questions











Question 183 - 200-201 discussion

Report
Export

Refer to the exhibit.

An engineer is analyzing a PCAP file after a recent breach An engineer identified that the attacker used an aggressive ARP scan to scan the hosts and found web and SSH servers. Further analysis showed several SSH Server Banner and Key Exchange Initiations. The engineer cannot see the exact data being transmitted over an encrypted channel and cannot identify how the attacker gained access How did the attacker gain access?

A.

by using the buffer overflow in the URL catcher feature for SSH

Answers
A.

by using the buffer overflow in the URL catcher feature for SSH

B.

by using an SSH Tectia Server vulnerability to enable host-based authentication

Answers
B.

by using an SSH Tectia Server vulnerability to enable host-based authentication

C.

by using an SSH vulnerability to silently redirect connections to the local host

Answers
C.

by using an SSH vulnerability to silently redirect connections to the local host

D.

by using brute force on the SSH service to gain access

Answers
D.

by using brute force on the SSH service to gain access

Suggested answer: D

Explanation:

The scenario described involves an attacker conducting an aggressive ARP scan followed by multiple SSH Server Banner and Key Exchange Initiations. The lack of visibility into the encrypted data transmitted over the SSH channel suggests that the attacker may have gained access by brute-forcing the SSH service. This method involves attempting numerous combinations of usernames and passwords until the correct credentials are found, allowing unauthorized access to the server.

Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) course1.

Cisco Cybersecurity documents and resources

asked 07/10/2024
Velmurugan P
42 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first