题目
题目

4520_COMP_SCI_X_0006 Quiz 3

单项选择题

In a penetration testing scenario, you captured encrypted traffic between a client and a server using Wireshark. You identified the protocol as being SSH. You then used Nmap to identify the version of the SSH server and discovered it was vulnerable to a specific brute-force attack. Using Hydra, you attempted to exploit this vulnerability. Considering this flow, which of the following sequences of filters or commands is most likely accurate?

选项
A.Wireshark: tcp.port == 22, Nmap: -p 22 -sV target_IP, Hydra: -l username -P passlist.txt ssh://target_IP
B.Wireshark: ssh.request, Nmap: -p 22 --version-light target_IP, Hydra: -l username -p password ssh://target_IP
C.Wireshark: tcp.dstport == 23, Nmap: -p 22 -A target_IP, Hydra: -l username -P passlist.txt sftp://target_IP
D.Wireshark: protocol == SSH, Nmap: -p 21 -sV target_IP, Hydra: -u username -list passlist.txt -service ssh target_IP
查看解析

查看解析

标准答案
Please login to view
思路分析
First, let's restate the scenario: you captured traffic that was SSH, used Nmap to determine the SSH service version on port 22, and then attempted a brute-force using Hydra with a username list and a password list. We want the sequence of filters/commands that aligns with this flow. Option 1: Wireshark: tcp.port == 22, Nmap: -p 22 -sV target_IP, Hydra: -l username -P passlist.txt ssh://target_IP - This matches the described steps precisely: filter for SSH traffic on port 22 in Wireshark, probe port 2......Login to view full explanation

登录即可查看完整答案

我们收录了全球超50000道考试原题与详细解析,现在登录,立即获得答案。

更多留学生实用工具

加入我们,立即解锁 海量真题独家解析,让复习快人一步!