New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil 212-82 Exam - Topic 10 Question 20 Discussion

Actual exam question for Eccouncil's 212-82 exam
Question #: 20
Topic #: 10
[All 212-82 Questions]

You have been assigned to perform a vulnerability assessment of a web server located at IP address 20.20.10.26. Identify the vulnerability with a severity score of &

Show Suggested Answer Hide Answer
Suggested Answer: A, A

TCP Timestamps is the vulnerability with a severity score of 8.0. This can be verified by performing a vulnerability assessment of the web server located at IP address 20.20.10.26 using the OpenVAS vulnerability scanner, available with the Parrot Security machine, with credentials admin/password. To perform the vulnerability assessment, one can follow these steps:

Launch the Parrot Security machine and open a terminal.

Enter the command sudo openvas-start to start the OpenVAS service and wait for a few minutes until it is ready.

Open a web browser and navigate to https://127.0.0.1:9392 to access the OpenVAS web interface.

Enter the credentials admin/password to log in to OpenVAS.

Click on Scans -> Tasks from the left menu and then click on the blue icon with a star to create a new task.

Enter a name and a comment for the task, such as ''Web Server Scan''.

Select ''Full and fast'' as the scan config from the drop-down menu.

Click on the icon with a star next to Target to create a new target.

Enter a name and a comment for the target, such as ''Web Server''.

Enter 20.20.10.26 as the host in the text box and click on Save.

Select ''Web Server'' as the target from the drop-down menu and click on Save.

Click on the green icon with a play button next to the task name to start the scan and wait for it to finish.

Click on the task name to view the scan report and click on Results from the left menu to see the list of vulnerabilities found.

Sort the list by Severity in descending order and look for the vulnerability with a severity score of 8.0. The screenshot below shows an example of performing these steps: The vulnerability with a severity score of 8.0 is TCP Timestamps, which is an option in TCP packets that can be used to measure round-trip time and improve performance, but it can also reveal information about the system's uptime, clock skew, or TCP sequence numbers, which can be used by attackers to launch various attacks, such as idle scanning, OS fingerprinting, or TCP hijacking1. The vulnerability report provides more details about this vulnerability, such as its description, impact, solution, references, and CVSS score2. Reference: Screenshot of OpenVAS showing TCP Timestamps vulnerability, TCP Timestamps Vulnerability, Vulnerability Report


Contribute your Thoughts:

0/2000 characters
Golda
3 months ago
Not sure if the severity score is accurate for that IP.
upvoted 0 times
...
Noemi
3 months ago
TCP timestamps are a known vulnerability, but not the worst.
upvoted 0 times
...
Ettie
4 months ago
Wait, are we really still seeing anonymous FTP logins in 2023?
upvoted 0 times
...
Jessenia
4 months ago
I think FTP unencrypted login is a big issue here.
upvoted 0 times
...
Rupert
4 months ago
You can definitely use OpenVAS for this!
upvoted 0 times
...
Justine
4 months ago
I’m leaning towards TCP timestamps, but I vaguely remember something about how UDP timestamps can also be an issue.
upvoted 0 times
...
Elvera
4 months ago
I feel like we had a similar question about anonymous FTP logins in class, but I can't recall the exact details.
upvoted 0 times
...
Hyman
5 months ago
I think the FTP unencrypted cleartext login could be a serious vulnerability, but I need to double-check the severity scores we discussed.
upvoted 0 times
...
Valentin
5 months ago
I remember practicing with OpenVAS, but I'm not sure if I should focus on TCP or UDP timestamps for this question.
upvoted 0 times
...
Charlesetta
5 months ago
This looks like a straightforward vulnerability assessment question. I'll start by scanning the web server using OpenVAS and see what vulnerabilities it identifies.Aiden: Hmm, I'm not too familiar with using OpenVAS, but I think I can figure it out. I'll try to find the credentials and see what vulnerabilities it can detect.Olivia: TCP timestamps? That's an interesting one. I'll need to research that a bit more to understand the potential severity and impact.Ethan: FTP unencrypted cleartext login seems like a pretty serious vulnerability. I'll make sure to focus on that and provide a detailed explanation in my answer.
upvoted 0 times
...
Galen
5 months ago
FTP unencrypted cleartext login seems like a pretty serious vulnerability. I'll make sure to focus on that and provide a detailed explanation in my answer.
upvoted 0 times
...
Callie
5 months ago
TCP timestamps? That's an interesting one. I'll need to research that a bit more to understand the potential severity and impact.
upvoted 0 times
...
Elza
5 months ago
This looks like a straightforward vulnerability assessment question. I'll start by scanning the web server using OpenVAS and see what vulnerabilities it identifies.
upvoted 0 times
...
Mitsue
5 months ago
Hmm, I'm not too familiar with using OpenVAS, but I think I can figure it out. I'll try to find the credentials and see what vulnerabilities it can detect.
upvoted 0 times
...
Michael
5 months ago
Hmm, I'm not sure about this one. The error message mentions a "HostConnectionFailed" issue, so it might not be just a credentials problem. I'll need to think this through carefully.
upvoted 0 times
...
Ashton
5 months ago
I think option A is a bit too narrow in scope. Reviewing the benefits plan for just the first component isn't enough - the new manager needs to look at the overall program benefits and ensure they're being met. C or D seem like the stronger choices here.
upvoted 0 times
...
Sue
5 months ago
Hmm, I'm not 100% sure about this one. I think it might be "silent", but I'm not totally confident. I'll have to think it through carefully.
upvoted 0 times
...

Save Cancel