ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 23 - 212-82 discussion

Report
Export

Initiate an SSH Connection to a machine that has SSH enabled in the network. After connecting to the machine find the file flag.txt and choose the content hidden in the file. Credentials for SSH login are provided below:

Hint:

Username: sam Password: admin@l23

A.
sam@bob
Answers
A.
sam@bob
B.
bob2@sam
Answers
B.
bob2@sam
C.
bob@sam
Answers
C.
bob@sam
D.
sam2@bob
Answers
D.
sam2@bob
Suggested answer: C

Explanation:

Quid pro quo is the social engineering technique that Johnson employed in the above scenario.

Social engineering is a technique that involves manipulating or deceiving people into performing actions or revealing information that can be used for malicious purposes. Social engineering can be performed through various methods, such as phone calls, emails, websites, etc. Quid pro quo is a social engineering method that involves offering a service or a benefit in exchange for information or access. Quid pro quo can be used to trick victims into believing that they are receiving help or assistance from a legitimate source, while in fact they are compromising their security or privacy . In the scenario, Johnson performed quid pro quo by claiming himself to represent a technical support team from a vendor and offering to help sibertech.org with a server issue, while in fact he prompted the victim to execute unusual commands and install malicious files, which were then used to collect and pass critical information to Johnson's machine. Diversion theft is a social engineering method that involves diverting the delivery or shipment of goods or assets to a different location or destination. Elicitation is a social engineering method that involves extracting information from a target by engaging them in a conversation or an interaction. Phishing is a social engineering method that involves sending fraudulent emails or messages that appear to come from a trusted source, such as a bank, a company, or a person, and asking the recipient to click on a link, open an attachment, or provide personal or financial information.

asked 18/09/2024
Jose Leonardo
26 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first