GIAC GPEN - GIAC Penetration Tester
You are using the Nmap Scripting Engine and want detailed output of the script as it runs. Which option do you include in the command string?
What concept do Rainbow Tables use to speed up password cracking?
You are pen testing a network and have shell access to a machine via Netcat. You try to use ssh to access another machine from the first machine. What is the expected result?
While scanning a remote system that is running a web server with a UDP scan and monitoring the scan with a sniffer, you notice that the target is responding with ICMP Port Unreachable only once a second What operating system is the target likely running?
What problem occurs when executing the following command from within a netcat raw shell? sudo cat /etc/shadow
When sniffing wireless frames, the interface mode plays a key role in successfully collecting traffic. Which of the mode or modes are best used for sniffing wireless traffic?
How can web server logs be leveraged to perform Cross-Site Scripting (XSSI?
You have compromised a Windows workstation using Metasploit and have injected the Meterpreter payload into the svchost process. After modifying some files to set up a persistent backdoor you realize that you will need to change the modified and access times of the files to ensure that the administrator can't see the changes you made. Which Meterpreter module would you need to load in order to do this?
Why is OSSTMM beneficial to the pen tester?
While performing an assessment on a banking site, you discover the following link:
hnps://mybank.com/xfer.aspMer_toMaccount_number]&amount-[dollars]
Assuming authenticated banking users can be lured to your web site, which crafted html tag may be used to launch a XSRF attack?
