ACME corporation has decided to setup wireless (IEEE 802.11) network in it's sales branch at Tokyo
and found that channels 1, 6, 9,11 are in use by the neighboring offices. Which is the best channel
they can use?
D
Which Metasploitvncinject stager will allow VNC communications from the attacker to a listening
port of the attacker's choosing on the victim machine?
B
Explanation:
Reference:
http://www.rapid7.com/db/modules/payload/windows/vncinject/reverse_tcp
What is the MOST important document to obtain before beginning any penetration testing?
A
Explanation:
Reference:
Before starting a penetration test, all targets must be identified. These targets should be obtained
from the customer during the initial questionnaire phase. Targets can be given in the form of specific
IP addresses, network ranges, or domain names by the customer. In some instances, the only target
the customer provides is the name of the organization and expects the testers be able to identify the
rest on their own. It is important to define if systems like firewalls and IDS/IPS or networking
equipment that are between the tester and the final target are also part of the scope. Additional
elements such as upstream providers, and other 3rd party providers should be identified and defined
whether they are in scope or not.
While reviewing traffic from a tcpdump capture, you notice the following commands being sent from
a remote system to one of your web servers:
C:\>sc winternet.host.com create ncservicebinpath- "c:\tools\ncexe -I -p 2222 -e cmd.exe"
C:\>sc vJnternet.host.com query ncservice.
What is the intent of the commands?
C
Which of the following best describes a client side exploit?
C
Which of the following TCP packet sequences are common during a SYN (or half-open) scan?
C
Which of the following describes the direction of the challenges issued when establishing a wireless
(IEEE 802.11) connection?
D
You have gained shell on a Windows host and want to find other machines to pivot to, but the rules
of engagement state that you can only use tools that are already available. How could you find other
machines on the target network?
B
Explanation:
Reference:
http://www.slashroot.in/what-ping-sweep-and-how-do-ping-sweep
A penetration tester obtains telnet access to a target machine using a captured credential. While
trying to transfer her exploit to the target machine, the network intrusion detection systems keeps
detecting her exploit and terminating her connection. Which of the following actions will help the
penetration tester transfer an exploit and compile it in the target system?
D
What section of the penetration test or ethical hacking engagement final report is used to detail and
prioritize the results of your testing?
C
You are pen testing a Windows system remotely via a raw netcat shell. You want to quickly change
directories to where the Windows operating system resides, what command could you use?
B
A client with 7200 employees in 14 cities (all connected via high speed WAN connections) has
suffered a major external security breach via a desktop which cost them more than SI 72.000 and the
loss of a high profile client. They ask you to perform a desktop vulnerability assessment to identify
everything that needs to be patched. Using Nessus you find tens of thousands of vulnerabilities that
need to be patched. In the report you find workstations running several Windows OS versions and
service pack levels, anti-virus software from multiple vendors several major browser versions and
different versions of Acrobat Reader. Which of the following recommendations should you provide
with the report?
C
Which Metasploit payload includes simple upload and download functionality for moving files to and
from compromised systems?
D
Explanation:
Reference:
http://www.opensourceforu.com/2011/02/metasploit-meterpreter-payload/
A junior penetration tester at your firm is using a non-transparent proxy for the first time to test a
web server. He sees the web site In his browser but nothing shows up In the proxy. He tells you that
he just installed the non-transparent proxy on his computer and didn't change any defaults. After
verifying the proxy is running, you ask him to open up his browser configuration, as shown in the
figure, which of the following recommendations will correctly allow him to use the transparent proxy
with his browser?
C
Which of the following describe the benefits to a pass-the-hash attack over traditional password
cracking?
D