1. What are the five steps of ethical hacking?
Quais são as cinco etapas do processo de Ethical Hacker ou hacking ético?
1—Reconnaissance
2—Scanning
3—Enumeration
4—Compromise
5—Post-attack
1—Reconnaissance
2—Scanning
3—Enumeration
4—Compromise
5—Post-attack
2. During the reconnaissance step of the attack, what open ports were discovered by Zenmap? What
services were running on those ports?
21- ftp
22-ssh
23-telnet
25-smtp
53-domain
80-http
111- rpcbind
139-netbios-ssn
445-netbios-ssn
512-exec
513-login
514-shell
1099-java-rmi
1524-shell
2049-nfs
2121-ftp
3306-mysql
5432-postgresql
5900-vnc
6000-x11
6667-irc
8009-tcp/udp
21- ftp
22-ssh
23-telnet
25-smtp
53-domain
80-http
111- rpcbind
139-netbios-ssn
445-netbios-ssn
512-exec
513-login
514-shell
1099-java-rmi
1524-shell
2049-nfs
2121-ftp
3306-mysql
5432-postgresql
5900-vnc
6000-x11
6667-irc
8009-tcp/udp
3. What step in the hacking attack process uses Zenmap?
Step One- Reconnaissance
Step One- Reconnaissance
4. What step in the hacking attack process identifies known vulnerabilities?
Step two- Scanning
Step two- Scanning
5. During the vulnerability scan, you identified a vulnerable service in the Linux victim system.
What was the name of the vulnerable service?
It was vsftpd
It was vsftpd
6. If you are a member of a security penetration testing team, and you identify vulnerabilities and
exploits, should you obtain written permission from the owners prior to compromising and
exploiting the known vulnerability?
Se você é um membro de uma equipe de testes de penetração de segurança e você identifica vulnerabilidades e explorações, você deve obter permissão por escrito dos proprietários antes de comprometer e explorar a vulnerabilidade conhecida?
Yes, you should absolutely get permission from the owners prior to exploiting the known vulnerabilities.
No comments:
Post a Comment