You are pen testing a Windows system remotely via a raw netcat shell. You want to quickly change
directories to where the Windows operating system resides, what command could you use?
B
A client with 7200 employees in 14 cities (all connected via high speed WAN connections) has
suffered a major external security breach via a desktop which cost them more than SI 72.000 and the
loss of a high profile client. They ask you to perform a desktop vulnerability assessment to identify
everything that needs to be patched. Using Nessus you find tens of thousands of vulnerabilities that
need to be patched. In the report you find workstations running several Windows OS versions and
service pack levels, anti-virus software from multiple vendors several major browser versions and
different versions of Acrobat Reader. Which of the following recommendations should you provide
with the report?
C
Which Metasploit payload includes simple upload and download functionality for moving files to and
from compromised systems?
D
Explanation:
Reference:
http://www.opensourceforu.com/2011/02/metasploit-meterpreter-payload/
A junior penetration tester at your firm is using a non-transparent proxy for the first time to test a
web server. He sees the web site In his browser but nothing shows up In the proxy. He tells you that
he just installed the non-transparent proxy on his computer and didn't change any defaults. After
verifying the proxy is running, you ask him to open up his browser configuration, as shown in the
figure, which of the following recommendations will correctly allow him to use the transparent proxy
with his browser?
C
Which of the following describe the benefits to a pass-the-hash attack over traditional password
cracking?
D
You are pen testing a Linux target from your windows-based attack platform. You just moved a script
file from the windows system to the Linux target, but it will not execute properly. What is the most
likely problem?
A
Which of the following is the JavaScript variable used to store a cookie?
C
Explanation:
Reference:
http://www.w3schools.com/js/js_cookies.asp
Analyze the command output below. Given this information, which is the appropriate next step for
the tester?
Starting Nmap4.53 (hnp://insecure.org I at2010-09-30 19:13 EDT interesting ports on
192.163.116.101:
PORT STATE SERVICE
130/tcp filtered cisco-fna
131/tcp filtered cisco-tna
132/tcp filtered cisco-sys
133/tcp filtered statsrv
134/tcp filtered Ingres-net
135/tcp filtered msrpc
136/tcp filtered profile
137/tcp filtered netbios-ns
138/tcp filtered netbios-dgm
139/tcp open netbios-ssn
140/tcp filtered emfis-data
MAC Address: 00:30:1&:B8:14:8B (Shuttle)
warning: OSS can results may be unreliable because we could not find at least l open and l
closed port
Device type, general purpose
Running: Microsoft Windows XP
OS details: Microsoft Windows XP SP2
Network Distance : 1 hop
Nmap done: I IP address (I host up) scanned in l .263 seconds
B
The resulting business impact, of the penetration test or ethical hacking engagement is explained in
what section of the final report?
D
Explanation:
Reference:
http://www.frost.com/upld/get-data.do?id=1568233
You have been contracted to map me network and try to compromise the servers for a client. Which
of the following would be an example of scope creep' with respect to this penetration testing
project?
B