ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 224 - PT0-002 discussion

Report
Export

After gaining access to a Linux system with a non-privileged account, a penetration tester identifies the following file:

Which of the following actions should the tester perform FIRST?

A.
Change the file permissions.
Answers
A.
Change the file permissions.
B.
Use privilege escalation.
Answers
B.
Use privilege escalation.
C.
Cover tracks.
Answers
C.
Cover tracks.
D.
Start a reverse shell.
Answers
D.
Start a reverse shell.
Suggested answer: B

Explanation:

The file .scripts/daily_log_backup.sh has permissions set to 777, meaning that anyone can read, write, or execute the file. Since it's owned by the root user and the penetration tester has access to the system with a non-privileged account, this could be a potential avenue for privilege escalation. In a penetration test, after finding such a file, the tester would likely want to explore it and see if it can be leveraged to gain higher privileges. This is often done by inserting malicious code or commands into the script if it's being executed with higher privileges, such as root in this case.

asked 02/10/2024
Andre Passos
35 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first