ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 422 - PT0-002 discussion

Report
Export

A penetration tester runs an Nmap scan and obtains the following output:

Starting Nmap 7.80 ( https://nmap.org ) at 2023-02-12 18:53 GMT

Nmap scan report for 10.22.2.2

Host is up (0.0011s latency).

PORT STATE SERVICE VERSION

135/tcp open msrpc Microsoft Windows RPC

139/tcp open netbios-ssn Microsoft Windows netbios-ssn

445/tcp open microsoft-ds Microsoft Windows Server 2019

1433/tcp open ms-sql-s Microsoft SQL Server 2019

3389/tcp open ms-wbt-server Microsoft Terminal Services

8080/tcp open http Microsoft IIS 9.0

Which of the following commands should the penetration tester try next to explore this server?

A.
nikto -host http://10.22.2-2
Answers
A.
nikto -host http://10.22.2-2
B.
hydra -1 administrator -P passwords.txt ftp://10.22.2.2
Answers
B.
hydra -1 administrator -P passwords.txt ftp://10.22.2.2
C.
nmap -p 3389 ---script vnc-info.nse 10.22.2.2
Answers
C.
nmap -p 3389 ---script vnc-info.nse 10.22.2.2
D.
medusa -h 10.22.2.2 -n 1433 -u sa -P passwords.txt-Mmssql
Answers
D.
medusa -h 10.22.2.2 -n 1433 -u sa -P passwords.txt-Mmssql
Suggested answer: A

Explanation:

Given the Nmap scan results showing an open HTTP service on port 8080 running Microsoft IIS 9.0, the next logical step for the penetration tester would be to further explore the web server. Nikto is a web server scanner that can identify known vulnerabilities, configuration issues, and other security problems.

Using the command nikto -host http://10.22.2.2 will initiate a scan against the HTTP service on the target server, helping the tester to identify potential weaknesses that could be exploited.

Nikto official documentation: Nikto Documentation

Examples of web server vulnerability scanning in penetration testing: Writeup.

asked 02/10/2024
Muneer Deers
43 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first