CEH v9 Question of the Week: iptables
You have just been hired as an apprentice Security Engineer. Your manager asks you to take a look at iptables on a specific device. You quickly remember that iptables are:
Read moreYou have just been hired as an apprentice Security Engineer. Your manager asks you to take a look at iptables on a specific device. You quickly remember that iptables are:
Read moreYour boss asked you to perform a Web Application Penetration Testing. Before start, you decide to look for a security testing methodology to help you perform all tests. What security testing methodology will help you?
Read moreWhat exploitation tool will help you with SQL Injection?
Read moreYou have found a CVE-2007-2447: Remote Command Injection Vulnerability. This bug was originally reported against the anonymous calls to the SamrChangePassword() MS-RPC function in combination with the “username map script”smb.conf option (which is not enabled by default). The vulnerables version are Samba 3.0.0 – 3.0.25rc3. You want to exploit it and get access to the system. Which exploitation framework will help you with the task?
Read moreThe company you work for has a very strict “print only if necessary” policy and mobile phone use is discouraged in the office. Last night you noticed a colleague stayed late at the office printing a lot of proprietary documents. This morning you noticed the same person in a dark corner talking on a mobile phone in a hushed voice. On your lunch break, you see the same person talking to an employee of a competitor company. What do these indications suggest about the person?
Read more