New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil 212-82 Exam - Topic 7 Question 29 Discussion

Actual exam question for Eccouncil's 212-82 exam
Question #: 29
Topic #: 7
[All 212-82 Questions]

You are a penetration tester working to test the user awareness of the employees of the client xyz. You harvested two employees' emails from some public sources and are creating a client-side backdoor to send it to the employees via email. Which stage of the cyber kill chain are you at?

Show Suggested Answer Hide Answer
Suggested Answer: A, A

TCP Timestamps is the vulnerability with a severity score of 8.0. This can be verified by performing a vulnerability assessment of the web server located at IP address 20.20.10.26 using the OpenVAS vulnerability scanner, available with the Parrot Security machine, with credentials admin/password. To perform the vulnerability assessment, one can follow these steps:

Launch the Parrot Security machine and open a terminal.

Enter the command sudo openvas-start to start the OpenVAS service and wait for a few minutes until it is ready.

Open a web browser and navigate to https://127.0.0.1:9392 to access the OpenVAS web interface.

Enter the credentials admin/password to log in to OpenVAS.

Click on Scans -> Tasks from the left menu and then click on the blue icon with a star to create a new task.

Enter a name and a comment for the task, such as ''Web Server Scan''.

Select ''Full and fast'' as the scan config from the drop-down menu.

Click on the icon with a star next to Target to create a new target.

Enter a name and a comment for the target, such as ''Web Server''.

Enter 20.20.10.26 as the host in the text box and click on Save.

Select ''Web Server'' as the target from the drop-down menu and click on Save.

Click on the green icon with a play button next to the task name to start the scan and wait for it to finish.

Click on the task name to view the scan report and click on Results from the left menu to see the list of vulnerabilities found.

Sort the list by Severity in descending order and look for the vulnerability with a severity score of 8.0. The screenshot below shows an example of performing these steps: The vulnerability with a severity score of 8.0 is TCP Timestamps, which is an option in TCP packets that can be used to measure round-trip time and improve performance, but it can also reveal information about the system's uptime, clock skew, or TCP sequence numbers, which can be used by attackers to launch various attacks, such as idle scanning, OS fingerprinting, or TCP hijacking1. The vulnerability report provides more details about this vulnerability, such as its description, impact, solution, references, and CVSS score2. Reference: Screenshot of OpenVAS showing TCP Timestamps vulnerability, TCP Timestamps Vulnerability, Vulnerability Report


Contribute your Thoughts:

0/2000 characters
Eve
3 months ago
Reconnaissance was already done by harvesting emails.
upvoted 0 times
...
Cecil
3 months ago
Wait, are we really sending a backdoor via email? Sounds risky!
upvoted 0 times
...
Rex
3 months ago
Agreed, it's all about crafting the payload.
upvoted 0 times
...
Adolph
4 months ago
I think it's more like Exploitation, right?
upvoted 0 times
...
Gwenn
4 months ago
Definitely at the Weaponization stage.
upvoted 0 times
...
Pearlie
4 months ago
I practiced a similar question, and I think weaponization is correct. We're crafting the attack, right? But I can see how it could be confusing with exploitation.
upvoted 0 times
...
Lisha
4 months ago
I feel like this is definitely related to exploitation since we're trying to get the employees to run the backdoor. But weaponization seems close too.
upvoted 0 times
...
Billy
4 months ago
I'm not entirely sure, but I remember something about reconnaissance being about gathering information. We did collect emails, so maybe it's that?
upvoted 0 times
...
Brett
5 months ago
I think we might be in the weaponization stage since we're creating a backdoor to send via email. That sounds like preparing the payload.
upvoted 0 times
...
Elina
5 months ago
I've got this one! Sending the backdoor via email is clearly the Delivery stage, where the attacker is trying to get the malicious payload to the target.
upvoted 0 times
...
Felix
5 months ago
I'm a bit confused on this one. The details about creating a backdoor make me think it could be Exploitation, but I'm not entirely sure. I'll have to double-check my understanding of the cyber kill chain.
upvoted 0 times
...
Denny
5 months ago
Ah, I see what's going on here. The client is testing employee awareness, so this must be in the Reconnaissance stage where the attacker is gathering information.
upvoted 0 times
...
Antonio
5 months ago
Okay, let me think this through. The question mentions harvesting emails and creating a client-side backdoor, so I'm guessing this is in the Weaponization stage.
upvoted 0 times
...
Leslie
5 months ago
Hmm, this one's tricky. I think I need to carefully read through the details to determine the right stage of the cyber kill chain.
upvoted 0 times
...
Katie
5 months ago
This question seems straightforward, but I want to make sure I understand the details about section titles before answering.
upvoted 0 times
...
Carlota
5 months ago
This is a tricky one. I'm not sure if I should keep the schema the same or try to denormalize the data. I'll need to think through the trade-offs carefully.
upvoted 0 times
...
William
5 months ago
Hmm, this is a tricky one. I'll need to carefully review the options and think through the implications of each approach.
upvoted 0 times
...
Emmanuel
5 months ago
I'm leaning towards D - the services in scope. Since ISO/IEC 20000 is focused on IT service delivery, it makes sense that the auditors would be looking at the specific services that are covered by the certification.
upvoted 0 times
...
Alfred
5 months ago
I remember studying phishing specifically, and it seems to match the description here perfectly since it involves fake emails and websites.
upvoted 0 times
...
Kizzy
9 months ago
Weaponization? Really? I thought we were supposed to be the good guys here. Guess I'll have to rethink my career choices if this is what pen testing is all about.
upvoted 0 times
...
Jonelle
9 months ago
Haha, nice try! This is definitely Reconnaissance, my friend. Gotta gather those juicy email addresses before you can start your nefarious plans. Just make sure you're not going to, you know, actually hack them.
upvoted 0 times
Flo
8 months ago
D) Exploitation
upvoted 0 times
...
Shenika
8 months ago
C) Weaponization
upvoted 0 times
...
Alease
8 months ago
B) Command and control
upvoted 0 times
...
Jeniffer
8 months ago
A) Reconnaissance
upvoted 0 times
...
...
Glenn
10 months ago
Ah, the classic 'send a malicious email' tactic. I'd say this is Weaponization, but I hope you're not actually planning to follow through with it. Let's keep things ethical, shall we?
upvoted 0 times
Pearline
8 months ago
C) Weaponization
upvoted 0 times
...
Mozell
9 months ago
B) Command and control
upvoted 0 times
...
Sheldon
9 months ago
A) Reconnaissance
upvoted 0 times
...
...
Dustin
10 months ago
Yikes, this is some shady stuff. Harvesting emails and creating a backdoor? That's Exploitation, my dude. I don't think I can endorse this kind of pen testing.
upvoted 0 times
Ellsworth
9 months ago
That's Exploitation, my dude.
upvoted 0 times
...
Dusti
9 months ago
D) Exploitation
upvoted 0 times
...
Denise
9 months ago
C) Weaponization
upvoted 0 times
...
Kanisha
10 months ago
B) Command and control
upvoted 0 times
...
Elbert
10 months ago
A) Reconnaissance
upvoted 0 times
...
...
Erick
10 months ago
I believe it's Reconnaissance, as we gathered the employees' emails from public sources.
upvoted 0 times
...
Nan
10 months ago
Wait, we're supposed to be testing employee awareness, not actually hacking them! This is clearly Weaponization, but I'm not comfortable with this approach.
upvoted 0 times
...
Belen
11 months ago
I agree with Mila, we are preparing the backdoor to send via email.
upvoted 0 times
...
Mila
11 months ago
I think we are at the Weaponization stage.
upvoted 0 times
...

Save Cancel