ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 588 - SY0-601 discussion

Report
Export

A secondly administration is trying to determine whether a server is vulnerable to a range of attacks After using a tool, the administrator obtains the following output.

Which of the following attacks was successfully implemented based on the output?

A.
Memory leak
Answers
A.
Memory leak
B.
Race condition
Answers
B.
Race condition
C.
SQL injection
Answers
C.
SQL injection
D.
Directory traversal
Answers
D.
Directory traversal
Suggested answer: D

Explanation:

The directory traversal attack was successfully implemented based on the output. The output shows that the administrator used a tool called Nikto, which is a web server scanner that can detect vulnerabilities and misconfigurations3. The output also shows that Nikto found several files and directories that should not be accessible by web users, such as "/etc/passwd", "/var/log", "/etc/shadow", etc. This indicates that the web server or application has a vulnerability that allows an attacker to manipulate the file path and access arbitrary files on the server. This is a type of attack known as directory traversal, which can lead to information disclosure, privilege escalation, or remote code execution.

asked 02/10/2024
adnan reubin
30 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first