ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 404 - CAS-004 discussion

Report
Export

After a server was compromised an incident responder looks at log files to determine the attack vector that was used The incident responder reviews the web server log files from the time before an unexpected SSH session began:

Which of the following is the most likely vulnerability that was exploited based on the log files?

A.
Directory traversal revealed the hashed SSH password, which was used to access the server.
Answers
A.
Directory traversal revealed the hashed SSH password, which was used to access the server.
B.
A SQL injection was used during the ordering process to compromise the database server
Answers
B.
A SQL injection was used during the ordering process to compromise the database server
C.
The root password was easily guessed and used as a parameter lo open a reverse shell
Answers
C.
The root password was easily guessed and used as a parameter lo open a reverse shell
D.
An outdated third-party PHP plug-in was vulnerable to a known remote code execution
Answers
D.
An outdated third-party PHP plug-in was vulnerable to a known remote code execution
Suggested answer: A

Explanation:

The logs indicate a directory traversal attempt (/../..//.etc/shadow), which is a type of attack that exploits insufficient security validation/sanitization of user-supplied input file names, so that characters representing 'traverse to parent directory' are passed through to the file APIs. The /etc/shadow file on Unix systems contains password hashes. If an attacker successfully exploited this vulnerability, they could potentially access the hashed SSH password. This information could then be used to gain unauthorized access to the server if the hash was cracked.

asked 02/10/2024
Omer Awad
29 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first