New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil 212-82 Exam - Topic 4 Question 27 Discussion

Actual exam question for Eccouncil's 212-82 exam
Question #: 27
Topic #: 4
[All 212-82 Questions]

You are Harris working for a web development company. You have been assigned to perform a task for vulnerability assessment on the given IP address 20.20.10.26. Select the vulnerability that may affect the website according to the severity factor.

Hint: Greenbone web credentials: admin/password

Show Suggested Answer Hide Answer
Suggested Answer: A, A

TCP Timestamps is the vulnerability with a severity score of 8.0. This can be verified by performing a vulnerability assessment of the web server located at IP address 20.20.10.26 using the OpenVAS vulnerability scanner, available with the Parrot Security machine, with credentials admin/password. To perform the vulnerability assessment, one can follow these steps:

Launch the Parrot Security machine and open a terminal.

Enter the command sudo openvas-start to start the OpenVAS service and wait for a few minutes until it is ready.

Open a web browser and navigate to https://127.0.0.1:9392 to access the OpenVAS web interface.

Enter the credentials admin/password to log in to OpenVAS.

Click on Scans -> Tasks from the left menu and then click on the blue icon with a star to create a new task.

Enter a name and a comment for the task, such as ''Web Server Scan''.

Select ''Full and fast'' as the scan config from the drop-down menu.

Click on the icon with a star next to Target to create a new target.

Enter a name and a comment for the target, such as ''Web Server''.

Enter 20.20.10.26 as the host in the text box and click on Save.

Select ''Web Server'' as the target from the drop-down menu and click on Save.

Click on the green icon with a play button next to the task name to start the scan and wait for it to finish.

Click on the task name to view the scan report and click on Results from the left menu to see the list of vulnerabilities found.

Sort the list by Severity in descending order and look for the vulnerability with a severity score of 8.0. The screenshot below shows an example of performing these steps: The vulnerability with a severity score of 8.0 is TCP Timestamps, which is an option in TCP packets that can be used to measure round-trip time and improve performance, but it can also reveal information about the system's uptime, clock skew, or TCP sequence numbers, which can be used by attackers to launch various attacks, such as idle scanning, OS fingerprinting, or TCP hijacking1. The vulnerability report provides more details about this vulnerability, such as its description, impact, solution, references, and CVSS score2. Reference: Screenshot of OpenVAS showing TCP Timestamps vulnerability, TCP Timestamps Vulnerability, Vulnerability Report


Contribute your Thoughts:

0/2000 characters
Gerald
3 months ago
Wait, are we really still using FTP? That's surprising!
upvoted 0 times
...
Trinidad
3 months ago
Anonymous FTP Login Reporting could be a problem too.
upvoted 0 times
...
Annice
3 months ago
TCP timestamps? Not sure how serious that is.
upvoted 0 times
...
Felicidad
4 months ago
Totally agree, that one’s a major vulnerability!
upvoted 0 times
...
Jacob
4 months ago
I think FTP Unencrypted Cleartext Login is a big risk.
upvoted 0 times
...
Tula
4 months ago
I’m leaning towards option B because anonymous FTP can lead to serious data exposure, but I need to double-check the severity factors we discussed.
upvoted 0 times
...
Nicholle
4 months ago
I feel like TCP timestamps could be a concern, but I can't recall if they are as critical as the FTP issues.
upvoted 0 times
...
Reed
4 months ago
I think we practiced a similar question in class, and I remember that cleartext logins are usually a big risk. Maybe option C?
upvoted 0 times
...
Tiera
5 months ago
I remember studying about FTP vulnerabilities, but I'm not sure which one is more severe. Was it the unencrypted login or the anonymous access?
upvoted 0 times
...
Johnson
5 months ago
I'm a bit confused here. The question mentions a vulnerability assessment, but the options seem to be focused on different types of login issues. I'll need to re-read the question and options carefully to make sure I understand what they're asking for.
upvoted 0 times
...
Annice
5 months ago
Hmm, this seems straightforward. The hint about the web credentials makes me think the vulnerability is related to web access. I'll go with option C, FTP Unencrypted Cleartext Login, since that seems like a high-severity issue.
upvoted 0 times
...
Elenor
5 months ago
Okay, let's think this through step-by-step. The question is asking about a vulnerability assessment on a given IP address, and the hint provides some web credentials. I'll need to carefully review the options and consider the severity factor.
upvoted 0 times
...
Devorah
5 months ago
Alright, I've got this. The key is to focus on the severity factor, as the question asks. Based on that, I think option B, Anonymous FTP Login Reporting, is the most severe vulnerability listed here.
upvoted 0 times
...
Glory
5 months ago
Okay, let me think this through. I believe field sections make it easier for developers to navigate the fields in the code, providing a hierarchical structure. But I'm not totally confident about that.
upvoted 0 times
...
Rikki
5 months ago
This looks like a straightforward question about SOAP API calls. I think I can handle this one.
upvoted 0 times
...
Fletcher
10 months ago
Yo, who leaves the admin password as 'password'? That's just asking to get hacked. Definitely gotta go with C on this one, fam.
upvoted 0 times
Alfreda
9 months ago
User 3: Definitely gotta go with C on this one, fam.
upvoted 0 times
...
Scarlet
9 months ago
User 2: Scarlet is right, that's a major security risk.
upvoted 0 times
...
Francoise
9 months ago
User 1: Yo, who leaves the admin password as 'password'? That's just asking to get hacked.
upvoted 0 times
...
...
Ozell
10 months ago
TCP timestamps? Really? That's just a minor issue. The FTP login is way more concerning. I'm going with C for sure.
upvoted 0 times
Malcom
9 months ago
User 3: I'm going with C for sure.
upvoted 0 times
...
Sanjuana
9 months ago
User 3: I'm going with C for sure.
upvoted 0 times
...
Chan
9 months ago
User 2: I agree, the FTP login is way more concerning.
upvoted 0 times
...
Royce
9 months ago
User 2: I agree, the FTP login is way more concerning.
upvoted 0 times
...
Blondell
9 months ago
User 1: TCP timestamps? Really? That's just a minor issue.
upvoted 0 times
...
Justa
9 months ago
User 1: TCP timestamps? Really? That's just a minor issue.
upvoted 0 times
...
...
Leslie
10 months ago
Haha, 'admin/password' as the credentials? Looks like the web dev team needs a lesson in cybersecurity 101. Definitely C for me.
upvoted 0 times
...
Alica
10 months ago
Hold up, the hint mentions Greenbone web credentials. Doesn't that mean the real vulnerability is probably related to the web app, not FTP? I'm going with C.
upvoted 0 times
Salome
9 months ago
User 2: Yeah, I agree. Let's go with option C for FTP Unencrypted Cleartext Login.
upvoted 0 times
...
Anthony
10 months ago
User 1: I think you're right, the hint does point towards a web app vulnerability.
upvoted 0 times
...
...
Fabiola
10 months ago
FTP Unencrypted Cleartext Login seems like the obvious choice here. That's a major security vulnerability that can give attackers access to sensitive data.
upvoted 0 times
...
Verdell
10 months ago
I believe TCP timestamps could also be a potential vulnerability.
upvoted 0 times
...
Gary
11 months ago
I agree with Millie, FTP Unencrypted Cleartext Login is a major security risk.
upvoted 0 times
...
Millie
11 months ago
I think the vulnerability could be FTP Unencrypted Cleartext Login.
upvoted 0 times
...

Save Cancel