14 1 Flashcards

(41 cards)

1
Q

___ - file that controls what and where facilities are logged. If remote logging is set, ‘@loghost’ syntax will be present

A

/etc/syslog.conf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Unix/Linux Rootkits:
___ - Replaces system application with rooted system files (ls, find, ps, netstat, login, and passwd commands) and inetd daemon services.

A

User-Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

unix/linux syntax:
___ - outputs full, long list of active processes.
___ - prints current running processes
___ - prints processes in full list

A

ps

  • e
  • f
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

___ - this file is referenced for hostname resolution.

A

/etc/hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Unix/Linux Shell History File:

___ - History file is located in user’s home directory as .bash_history.

A

Bourne Again Shell (bash)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

unix/linux syntax:
___ - (solaris only) displays information on all users (logged in or not) and system accounts. Output contains user, UID, group name, GUID, and comments.

A

logins

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

unix/linux syntax:
___ - prints network connections.
options:
___ - displays routing information
___ - displays IP instead of interface
___ - displays connections/listening ports
___ - display associated PID for connections/ports

A

netstat

  • r
  • n
  • a
  • o
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Overwrite the file with nothing, thereby clearing out all history file content. syntax = ___

A

echo “” .bash_history

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

unix/linux syntax:

___ - displays logged in username, terminal, login time, and where user is logged in from.

A

who

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Tool to be used to conceal files within target system.

A

touch -t

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

System Change Logs:

___ - searches inside text files for matching patterns.

A

grep

-v

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

unix/linux syntax:
___ - manages job scheduling with cron jobs.
___ - edit job
___ - list jobs

A

crontab

  • e
  • l
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Unix/Linux Shell History File:

___ - No history file supported. Ideal shell; nothing is recorded or needs to be cleaned.

A

Bourne Shell (sh)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

unix/linux syntax:
___ - searches for files across the filesystem.
___ - filename to search for
___ - type of file
___ - modified file time range in minutes

A

find

  • name
  • type
  • mmin
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Syntax; Unset history file variable in a bash shell.

A

unset HISTFILE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Unix/Linux Rootkits:

___ - Modifies or replaces firmware to hide below the OS. Very hard to detect. Gets started before the OS.

A

Firmware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

unix/linux syntax:
___ - provides interactive monitoring of active processes on UNIX OSs. In Linux, ‘top’ provides the same output.
___ - print info about processes and users

18
Q

Syntax; Clear the history file in a bash shell.

19
Q

command to use the unreal exploit

A

use exploit/unix/irc/unreal_ircd_3281_backdoor

20
Q

unix/linux syntax:

___ - prints ARP cache.

21
Q

Unix/Linux Rootkits:

___ - Exploits functionality of Loadable Kernel Module (LKM) to hide itself below the Application Layer.

22
Q

System Change Logs:

The ___ or ___ can be used to edit plaintext files.

A

vi editor
or
grep

23
Q

The ___ module exploits a buffer overflow vulnerability in the adm_build_path() function of sadmind.

A

sadmind_adm_build_path

24
Q

unix/linux syntax:
___ - Display processor (type,processor,chip) info
___ - verbose mode, extra info

25
unix/linux syntax: ___ - displays all system hardware and software revision info ___ - print only patch revision info
showrev | -p
26
unix/linux syntax: | ___ - displays summary of system and user activity.
w
27
___ removes user's last entry from WTMP, UTMP, LASTLOG, WTMPX, and UTMPX files. ___ attempts to remove a username from all possible files and binaries.
ZAP3
28
unix/linux syntax: ___ - displays software package information ___ - list in long format
pkginfo | -l
29
unix/linux syntax: ___ - display amount of disk space by file system ___ - prints block sizes
df | -k
30
ZAP3: | ___ - uses /var/adm/wtmpx to display login/logout and system boot info; most recent entry at top.
last
31
unix/linux syntax: ___ - display current system information ___ - prints all system info
uname | -a
32
unix/linux syntax: ___ - (solaris only) displays logged in username, active process/CPU time owned by user, login time, machine name, and time of day.
whodo
33
___ are software programs and files designed to provide continued unauthorized root access to a system and hide any evidence of compromise.
Rootkits
34
Command to use the sadmind exploit
use exploit/solaris/sunrpc/sadmind_adm_build_path
35
Unix/Linux Enumeration: ___ - Displays logged in users information. option: ___ - displays in long list format
finger | -l
36
Unix/Linus Enumeration: ___ - Displays logged in user information (similar to finger) ___ - display in long list format
rusers | -l
37
Unix/Linux Enumeration: ___ - Display target host RPC services by program, transport, service name, and owner. option: ___ - Display associated port numbers.
rpcinfo | -p
38
Unix/Linux Enumeration: ___ - Displays a target hosts NFS exported file system. option: ___ - Prints the list of shared file systems.
showmount | -e
39
___ (aka port forwarding) is the encapsulation of data for transmission through a network.
Tunneling
40
Tunnel Types: ___ tunnel opens a port on the AP and sends data through the redirector (pivot), who then sends it to the targets vulnerable port.
Forward tunnel
41
Tunnel Types: | ___ tunnel opens a port on the redirector (pivot) and returns data to the AP.
Reverse tunnel