ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 56 - PT0-002 discussion

Report
Export

A penetration tester has identified several newly released CVEs on a VoIP call manager. The scanning tool the tester used determined the possible presence of the CVEs based off the version number of the service. Which of the following methods would BEST support validation of the possible findings?

A.
Manually check the version number of the VoIP service against the CVE release
Answers
A.
Manually check the version number of the VoIP service against the CVE release
B.
Test with proof-of-concept code from an exploit database
Answers
B.
Test with proof-of-concept code from an exploit database
C.
Review SIP traffic from an on-path position to look for indicators of compromise
Answers
C.
Review SIP traffic from an on-path position to look for indicators of compromise
D.
Utilize an nmap -sV scan against the service
Answers
D.
Utilize an nmap -sV scan against the service
Suggested answer: B

Explanation:

Testing with proof-of-concept code from an exploit database is the best method to support validation of the possible findings, as it will demonstrate whether the CVEs are actually exploitable on the target VoIP call manager. Proof-of-concept code is a piece of software or script that shows how an attacker can exploit a vulnerability in a system or application. An exploit database is a repository of publicly available exploits, such as Exploit Database or Metasploit.

Reference: https://dokumen.pub/hacking-exposed-unified-communications-amp-voip-securitysecrets-amp- solutions-2nd-edition-9780071798778-0071798773-9780071798761-0071798765.html

asked 02/10/2024
Reselan Govender
33 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first