Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GAQM Exam CPEH-001 Topic 3 Question 107 Discussion

Actual exam question for GAQM's CPEH-001 exam
Question #: 107
Topic #: 3
[All CPEH-001 Questions]

What file system vulnerability does the following command take advantage of?

type c:\anyfile.exe > c:\winnt\system32\calc.exe:anyfile.exe

Show Suggested Answer Hide Answer
Suggested Answer: A

Canaries or canary words are known values that are placed between a buffer and control data on the stack to monitor buffer overflows. When the buffer overflows, it will clobber the canary, making the overflow evident. This is a reference to the historic practice of using canaries in coal mines, since they would be affected by toxic gases earlier than the miners, thus providing a biological warning system.


Contribute your Thoughts:

Marla
2 months ago
I heard the exam proctors are using this question to secretly recruit for the FBI's cybersecurity team. Better choose wisely, folks!
upvoted 0 times
...
Staci
2 months ago
Backdoor access? Really? That's about as subtle as a bull in a china shop. I'm going with the good old ADS option, that's where the real magic happens.
upvoted 0 times
Emelda
1 months ago
Backdoor access might be too obvious, ADS is more subtle.
upvoted 0 times
...
Paola
1 months ago
I agree, ADS can be quite powerful if used correctly.
upvoted 0 times
...
Jade
1 months ago
Yeah, ADS is definitely a clever way to hide things.
upvoted 0 times
...
Yaeko
2 months ago
I think ADS is the way to go, it's a sneaky one.
upvoted 0 times
...
...
Kaitlyn
2 months ago
Wait, is this one of those 'trick questions' where the answer is actually 'all of the above'? I'm not falling for that again!
upvoted 0 times
Lilli
21 days ago
C) NTFS
upvoted 0 times
...
Marica
1 months ago
B) ADS
upvoted 0 times
...
Coleen
1 months ago
A) HFS
upvoted 0 times
...
...
Leontine
3 months ago
Ah, the old Alternate Data Streams trick! Classic NTFS vulnerability, I'd bet my bottom dollar on that one.
upvoted 0 times
Ivette
1 months ago
NTFS is known for having some tricky vulnerabilities, like this one with Alternate Data Streams.
upvoted 0 times
...
Richelle
1 months ago
I remember reading about this vulnerability before. It's a sneaky way to hide malicious files.
upvoted 0 times
...
Hannah
1 months ago
Yes, you're right! It's definitely taking advantage of Alternate Data Streams in NTFS.
upvoted 0 times
...
...
Sherron
3 months ago
Ooh, this looks like an interesting one! I'm pretty sure it's got something to do with NTFS, but I'll have to think it through a bit more.
upvoted 0 times
Mickie
29 days ago
Interesting, I didn't know NTFS had that vulnerability. Thanks for the info!
upvoted 0 times
...
Detra
1 months ago
You're right! NTFS allows for alternate data streams, which can be used to hide files like in this command.
upvoted 0 times
...
Kara
1 months ago
C) NTFS
upvoted 0 times
...
Rosamond
1 months ago
I think it's ADS, because it's using alternate data streams to hide the malicious file.
upvoted 0 times
...
Franklyn
1 months ago
D) Backdoor access
upvoted 0 times
...
Alana
1 months ago
C) NTFS
upvoted 0 times
...
Kathrine
2 months ago
B) ADS
upvoted 0 times
...
Celeste
3 months ago
A) HFS
upvoted 0 times
...
...
Toshia
3 months ago
I believe the vulnerability being exploited here is related to NTFS, which supports ADS.
upvoted 0 times
...
Barb
4 months ago
Yes, I agree. ADS stands for Alternate Data Streams and can be used to hide malicious files.
upvoted 0 times
...
Lindsay
4 months ago
I think the command is taking advantage of ADS.
upvoted 0 times
...

Save Cancel