Google Dorks and Client-side Backdoors Quiz
9 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What Google dork operator would you use to only get results that show file extensions?

  • inurl
  • filetype (correct)
  • site
  • ext
  • In the cyber kill chain, at which stage are you if you are creating a client-side backdoor to send it to the employees via email?

  • Command and control
  • Reconnaissance
  • Exploitation
  • Weaponization (correct)
  • What advanced operator would allow a penetration tester to restrict the search to an organization’s web domain in Google search?

  • [location:]
  • [link:]
  • [allinurl:]
  • [site:] (correct)
  • Which attack technique involves gaining unauthorized access to a target network, remaining undetected for a long time, and obtaining sensitive information without sabotaging the organization?

    <p>Advanced Persistent Threat (APT)</p> Signup and view all the answers

    What type of cloud attack did Alice perform in the scenario?

    <p>Man-in-the-cloud (MITC) attack</p> Signup and view all the answers

    What type of vulnerability assessment was performed by Johnson in the scenario?

    <p>Host-based assessment</p> Signup and view all the answers

    What service is running on port 389 according to the audit report?

    <p>LDAP, and you must change it to 636, which is LDAPS</p> Signup and view all the answers

    What type of attack did Richard perform in the scenario?

    <p>Replay attack</p> Signup and view all the answers

    What protocol does Garry use to manage networked devices from a remote location?

    <p>SNMP</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser