Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil Exam 212-82 Topic 16 Question 35 Discussion

Actual exam question for Eccouncil's 212-82 exam
Question #: 35
Topic #: 16
[All 212-82 Questions]

You have been assigned to perform a vulnerability assessment of a web server located at IP address 20.20.10.26. Identify the vulnerability with a severity score of &

Show Suggested Answer Hide Answer
Suggested Answer: A, A

TCP Timestamps is the vulnerability with a severity score of 8.0. This can be verified by performing a vulnerability assessment of the web server located at IP address 20.20.10.26 using the OpenVAS vulnerability scanner, available with the Parrot Security machine, with credentials admin/password. To perform the vulnerability assessment, one can follow these steps:

Launch the Parrot Security machine and open a terminal.

Enter the command sudo openvas-start to start the OpenVAS service and wait for a few minutes until it is ready.

Open a web browser and navigate to https://127.0.0.1:9392 to access the OpenVAS web interface.

Enter the credentials admin/password to log in to OpenVAS.

Click on Scans -> Tasks from the left menu and then click on the blue icon with a star to create a new task.

Enter a name and a comment for the task, such as ''Web Server Scan''.

Select ''Full and fast'' as the scan config from the drop-down menu.

Click on the icon with a star next to Target to create a new target.

Enter a name and a comment for the target, such as ''Web Server''.

Enter 20.20.10.26 as the host in the text box and click on Save.

Select ''Web Server'' as the target from the drop-down menu and click on Save.

Click on the green icon with a play button next to the task name to start the scan and wait for it to finish.

Click on the task name to view the scan report and click on Results from the left menu to see the list of vulnerabilities found.

Sort the list by Severity in descending order and look for the vulnerability with a severity score of 8.0. The screenshot below shows an example of performing these steps: The vulnerability with a severity score of 8.0 is TCP Timestamps, which is an option in TCP packets that can be used to measure round-trip time and improve performance, but it can also reveal information about the system's uptime, clock skew, or TCP sequence numbers, which can be used by attackers to launch various attacks, such as idle scanning, OS fingerprinting, or TCP hijacking1. The vulnerability report provides more details about this vulnerability, such as its description, impact, solution, references, and CVSS score2. Reference: Screenshot of OpenVAS showing TCP Timestamps vulnerability, TCP Timestamps Vulnerability, Vulnerability Report


Contribute your Thoughts:

Cristal
3 months ago
Ah, the old 'admin/password' trick. Those hackers are getting sneakier every day! I'm going to go with B and hope for the best.
upvoted 0 times
Lezlie
2 months ago
Yeah, using unencrypted cleartext login is definitely risky. Let's go with B for our assessment.
upvoted 0 times
...
Nadine
3 months ago
I agree, hackers are always trying to find ways in. I think B sounds like a possible vulnerability.
upvoted 0 times
...
...
Rosalind
3 months ago
That's a good point, Bok. We should definitely check for TCP timestamps as well.
upvoted 0 times
...
Sheldon
3 months ago
D) UDP limestamps? Really? Sounds like someone's trying to trick us. I'm going with B, it's the classic FTP vulnerability.
upvoted 0 times
...
Almeta
3 months ago
Wait, we're supposed to use the admin/password credentials? That's just asking for trouble! I'd be careful with that...
upvoted 0 times
...
Dallas
3 months ago
Hmm, I'm not sure about this one. But I heard that OpenVAS is a pretty powerful tool for vulnerability assessments. Maybe we should give it a try?
upvoted 0 times
Val
3 months ago
I agree, OpenVAS should help us identify any vulnerabilities with severity scores.
upvoted 0 times
...
Audrie
3 months ago
Let's go ahead and use OpenVAS to scan the web server at 20.20.10.26.
upvoted 0 times
...
...
Melda
4 months ago
I think the answer is B. FTP Unencrypted Cleartext Login. That seems like a serious vulnerability with a high severity score.
upvoted 0 times
Malcolm
2 months ago
Willard: Good idea. Let's use the scanner with the provided credentials and see what it detects.
upvoted 0 times
...
Carin
3 months ago
Should we try using the OpenVAS vulnerability scanner to confirm if that vulnerability exists on the web server?
upvoted 0 times
...
Willard
3 months ago
Yes, that's a common vulnerability that can lead to unauthorized access to sensitive data.
upvoted 0 times
...
Virgie
3 months ago
I think the answer is B. FTP Unencrypted Cleartext Login. That seems like a serious vulnerability with a high severity score.
upvoted 0 times
...
...
Bok
4 months ago
I believe it could also be TCP timestamps. It's important to consider all possibilities.
upvoted 0 times
...
Sheldon
4 months ago
I agree with you, Sheldon. FTP Unencrypted Cleartext Login is a common vulnerability that should be checked.
upvoted 0 times
...
Rosalind
4 months ago
I think the vulnerability might be FTP Unencrypted Cleartext Login.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77