ExamGecko
Question list
Search
Search

Related questions











Question 33 - 312-50v12 discussion

Report
Export

A network administrator discovers several unknown files in the root directory of his Linux FTP server.

One of the files is a tarball, two are shell script files, and the third is a binary file is named "nc." The FTP server's access logs show that the anonymous user account logged in to the server, uploaded the files, and extracted the contents of the tarball and ran the script using a function provided by the FTP server's software. The "ps" command shows that the "nc" file is running as process, and the netstat command shows the "nc" process is listening on a network port.

What kind of vulnerability must be present to make this remote attack possible?

A.
File system permissions
Answers
A.
File system permissions
B.
Privilege escalation
Answers
B.
Privilege escalation
C.
Directory traversal
Answers
C.
Directory traversal
D.
Brute force login
Answers
D.
Brute force login
Suggested answer: A

Explanation:

File system permissions Processes may automatically execute specific binaries as part of their functionality or to perform other actions. If the permissions on the file system directory containing a target binary, or permissions on the binary itself, are improperly set, then the target binary may be overwritten with another binary using user-level permissions and executed by the original process. If the original process and thread are running under a higher permissions level, then the replaced binary will also execute under higher-level permissions, which could include SYSTEM.

Adversaries may use this technique to replace legitimate binaries with malicious ones as a means of executing code at a higher permissions level. If the executing process is set to run at a specific time or during a certain event (e.g., system bootup) then this technique can also be used for persistence.

asked 18/09/2024
Shirish Astagikar
39 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first