Question 36

Penetration-testing activities have concluded, and the initial findings have been reviewed with the client. Which of the following best describes the NEXT step in the engagement?
  • Question 37

    Which of the following commands will allow a penetration tester to permit a shell script to be executed by the file owner?
  • Question 38

    A penetration tester obtained the following results after scanning a web server using the dirb utility:
    ...
    GENERATED WORDS: 4612
    ----
    Scanning URL: http://10.2.10.13/ ----
    +
    http://10.2.10.13/about (CODE:200|SIZE:1520)
    +
    http://10.2.10.13/home.html (CODE:200|SIZE:214)
    +
    http://10.2.10.13/index.html (CODE:200|SIZE:214)
    +
    http://10.2.10.13/info (CODE:200|SIZE:214)
    ...
    DOWNLOADED: 4612 - FOUND: 4
    Which of the following elements is MOST likely to contain useful information for the penetration tester?
  • Question 39

    A penetration tester has obtained shell access to a Windows host and wants to run a specially crafted binary for later execution using the wmic.exe process call create function. Which of the following OS or filesystem mechanisms is MOST likely to support this objective?
  • Question 40

    An Nmap network scan has found five open ports with identified services. Which of the following tools should a penetration tester use NEXT to determine if any vulnerabilities with associated exploits exist on the open ports?