ExamGecko
Question list
Search
Search

Related questions











Question 366 - 312-50v12 discussion

Report
Export

You have compromised a server and successfully gained a root access. You want to pivot and pass traffic undetected over the network and evade any possible Intrusion Detection System. What is the best approach?

A.
Use Alternate Data Streams to hide the outgoing packets from this server.
Answers
A.
Use Alternate Data Streams to hide the outgoing packets from this server.
B.
Use HTTP so that all traffic can be routed vis a browser, thus evading the internal IntrusionDetection Systems.
Answers
B.
Use HTTP so that all traffic can be routed vis a browser, thus evading the internal IntrusionDetection Systems.
C.
Install Cryptcat and encrypt outgoing packets from this server.
Answers
C.
Install Cryptcat and encrypt outgoing packets from this server.
D.
Install and use Telnet to encrypt all outgoing traffic from this server.
Answers
D.
Install and use Telnet to encrypt all outgoing traffic from this server.
Suggested answer: C

Explanation:

https://linuxsecurityblog.com/2018/12/23/create-a-backdoor-with-cryptcat/ Cryptcat enables us to communicate between two systems and encrypts the communication between them with twofish, one of many excellent encryption algorithms from Bruce Schneier et al.

Twofish's encryption is on par with AES encryption, making it nearly bulletproof. In this way, the IDS can't detect the malicious behavior taking place even when its traveling across normal HTTP ports like 80 and 443.

asked 18/09/2024
HW Yan
45 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first