A penetration tester writes the following script:
Which of the following is the tester performing?
-z zero-I/O mode [used for scanning]
-v verbose
example output of script:
10.0.0.1: inverse host lookup failed: Unknown host
(UNKNOWN) [10.0.0.1] 22 (ssh) open
(UNKNOWN) [10.0.0.1] 23 (telnet) : Connection timed out
https://unix.stackexchange.com/questions/589561/what-is-nc-z-used-for
A penetration tester exploited a unique flaw on a recent penetration test of a bank. After the test was completed, the tester posted information about the exploit online along with the IP addresses of the exploited machines. Which of the following documents could hold the penetration tester accountable for this action?
A penetration tester will be performing a vulnerability scan as part of the penetration test on a client's website. The tester plans to run several Nmap scripts that probe for vulnerabilities while avoiding detection. Which of the following Nmap options will the penetration tester MOST likely utilize?
Nmap is a tool that can perform network scanning and enumeration by sending packets to hosts and analyzing their responses. The command Nmap -p 445 -n -T4 --open 172.21.0.0/16 would scan for SMB port 445 over a /16 network with the following options:
-p 445 specifies the port number to scan.
-n disables DNS resolution, which can speed up the scan by avoiding unnecessary queries.
-T4 sets the timing template to aggressive, which increases the speed of the scan by sending packets faster and waiting less for responses.
--open only shows hosts that have open ports, which can reduce the output and focus on relevant results. The other commands are not optimal for scanning SMB port 445 over a /16 network when stealth is not a concern and the task is time sensitive.
A penetration tester has compromised a customer's internal network, gaining access to a file server that hosts email server backups. Which of the following is the best tool to assist with data exfiltration?
A penetration tester is performing a social engineering penetration test and was able to create a remote session. Which of the following social engineering techniques was most likely successful?
Cordie
1 months agoMoon
2 months agoCarin
2 months agoFrederick
2 months agoMozell
3 months agoBeatriz
4 months agoNathan
4 months agoAnnmarie
5 months agoKassandra
5 months agoLera
5 months agoArt
5 months agoMaryanne
6 months agoNobuko
6 months agoLashawna
6 months agoRosalind
7 months agoChristiane
7 months agoHuey
7 months agoJamal
7 months agoErin
8 months agoRebbecca
8 months agoMarcelle
8 months agoTerrilyn
8 months agoAsuncion
8 months agoTamar
9 months agoAllene
9 months agoElin
9 months agoPhuong
9 months agoKati
9 months agoOren
10 months agoNathalie
10 months agoIzetta
10 months agoElroy
11 months agoRonald
11 months agoElenore
11 months agoKing
11 months agoMarya
11 months agoTemeka
12 months agoMichal
1 years agoLizbeth
1 years agoFrancene
1 years agoArlene
1 years agoAnastacia
1 years ago