题目
4520_COMP_SCI_X_0006 Quiz 3
单项选择题
In a penetration testing scenario, you captured encrypted traffic between a client and a server using Wireshark. You identified the protocol as being SSH. You then used Nmap to identify the version of the SSH server and discovered it was vulnerable to a specific brute-force attack. Using Hydra, you attempted to exploit this vulnerability. Considering this flow, which of the following sequences of filters or commands is most likely accurate?
选项
A.Wireshark: tcp.port == 22, Nmap: -p 22 -sV target_IP, Hydra: -l username -P passlist.txt ssh://target_IP
B.Wireshark: ssh.request, Nmap: -p 22 --version-light target_IP, Hydra: -l username -p password ssh://target_IP
C.Wireshark: tcp.dstport == 23, Nmap: -p 22 -A target_IP, Hydra: -l username -P passlist.txt sftp://target_IP
D.Wireshark: protocol == SSH, Nmap: -p 21 -sV target_IP, Hydra: -u username -list passlist.txt -service ssh target_IP
查看解析
标准答案
Please login to view
思路分析
First, let's restate the scenario: you captured traffic that was SSH, used Nmap to determine the SSH service version on port 22, and then attempted a brute-force using Hydra with a username list and a password list. We want the sequence of filters/commands that aligns with this flow.
Option 1: Wireshark: tcp.port == 22, Nmap: -p 22 -sV target_IP, Hydra: -l username -P passlist.txt ssh://target_IP
- This matches the described steps precisely: filter for SSH traffic on port 22 in Wireshark, probe port 2......Login to view full explanation登录即可查看完整答案
我们收录了全球超50000道考试原题与详细解析,现在登录,立即获得答案。
类似问题
What precautionary measure should be taken by penetration testers to ensure they have the legal right to conduct their tests on a particular computer or network?
When pivoting from a compromised node to a target node, only port 80 can be attacked
What are the most complete general steps taken to attack any networked device?
What is difference between vulnerability assessment and penetration testing?
更多留学生实用工具
希望你的学习变得更简单
加入我们,立即解锁 海量真题 与 独家解析,让复习快人一步!