ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 301 - PT0-002 discussion

Report
Export

Using the output, identify potential attack vectors that should be further investigated.

A.
See below.
Answers
A.
See below.
Suggested answer: A

Explanation:

1:

Null session enumeration

Weak SMB file permissions

Fragmentation attack

2:

nmap

-sV

-p 1-1023

192.168.2.2

3:

#!/usr/bin/python

export $PORTS = 21,22

for $PORT in $PORTS: try: s.connect((ip, port)) print(“%s:%s – OPEN” % (ip, port)) except socket.timeout print(“%:%s – TIMEOUT” % (ip, port)) except socket.error as e: print(“%:%s – CLOSED” % (ip, port)) finally s.close()

port_scan(sys.argv[1], ports)

asked 02/10/2024
Bruno Piovan
27 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first