[Attacks and Exploits] During a red -team exercise, a penetration tester obtains an employee's access badge. The tester uses the badge’s information to create a duplicate for unauthorized entry. Which of the following best describes this action?
[Information Gathering and Vulnerability Scanning] A penetration tester completes a scan and sees the following Nmap output on a host: Nmap scan report for victim (10.10.10.10) Host is up (0.0001s latency) PORT STATE SERVICE 161/udp open snmp 445/tcp open microsoft -ds 3389/tcp open ms -wbt-server Running Microsoft Windows 7 OS CPE: cpe:/o:microsoft:windows_7::sp0 The tester wants to obtain shell access. Which of the following related exploits should the tester try first?
[Attacks and Exploits] A penetration tester gains access to the target network and observes a running SSH server. Which of the following techniques should the tester use to obtain the version of SSH running on the target server?
[Tools and Code Analysis] A penetration tester writes a Bash script to automate the execution of a ping command on a Class C network: for var in --MISSING TEXT -- do ping -c 1 192.168.10.$var done Which of the following pieces of code should the penetration tester use in place of —MISSING TEXT —?
[Tools and Code Analysis] A penetration tester performs an assessment on the target company's Kubernetes cluster using kube - hunter. Which of the following types of vulnerabilities could be detected with the tool?
[Attacks and Exploits] During a security assessment, a penetration tester gains access to an internal server and manipulates some data to hide its presence. Which of the following is the best way for the penetration tester to hide the activities performed?