1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kkurt [141]
3 years ago
13

A network administrator discovers several unknown files in the root directory of his Linux FTP server. Oneof the files is a tarb

all, two are shell script files, and the third is a binary file is named "nc." The FTP server's access logs show that the anonymous user account logged in to the server, uploaded the files, andextracted the contents of the tarball and ran the script using a function provided by the FTP server's software. The ps command shows that the nc file is running as process, and the netstat command shows the nc process is listening on a network port.What kind of vulnerability must be present to make this remote attack possible?A. File system permissionsB. Privilege escalationC. Directory traversalD. Brute force login
Computers and Technology
1 answer:
jarptica [38.1K]3 years ago
3 0

The most likely vulnerability that the attacker might have exploited is file system permissions.

Further explanation:

This hack is most likely a case of improper file system permissions. The attacker took advantage of this vulnerability and was able to read, right, and execute the content that was inside the FTP server. The network admin had most likely not configured the FTP server well enough and had incorrect file system permissions lying around which led to the anonymous user accessing restricted files and directories and modifying them.

Even worse is the fact that the anonymous user account was able to breach and maintain persistence. If the ps command shows that the nc file is running as process, and the netstat command shows the nc process is listening on a network port, then this means that the anonymous user is most likely still inside and is listening and waiting for an admin to log in so that he is able to establish a shell session.

Somehow, the Linux FTP server has allowed people to upload files and this can open doors to malicious attacks. If the anonymous user account has Read, write, modify, execute, list folder contents, traverse folder, list folder, read attributes, and many more file permissions, he will be able to modify the content that is inside the FTP server in many undesirable ways.

Learn more about security vulnerabilities in Information security.

brainly.com/question/11212666

brainly.com/question/2211853

brainly.com/question/13677934

#LearnWithBrainly

You might be interested in
Suppose that the first number of a sequence is x, where x is an integer. Define ; ‍ if is even; ‍ ‍ ‍ if is odd. Then there exis
Anastasy [175]

Answer:

The program is written in c++ , go to the explanation part for it, the output can be found in the attached files.

Explanation:

C++ Code:

#include <iostream>

using namespace std;

int main() {

int x;

cout<<"Enter a number: ";

cin>>x;

int largest = x;

int position = 1, count = 0;

while(x != 1)

{

count++;

cout<<x<<" ";

if(x > largest)

{

largest = x;

position = count;

}

if(x%2 == 0)

x = x/2;

else

x = 3*x + 1;

}

cout<<x<<endl;

cout<<"The largest number of the sequence is "<<largest<<endl;

cout<<"The position of the largest number is "<<position<<endl;

return 0;

}

4 0
3 years ago
How do you do these two questions? The first might have multiple answers and the second will have only one answer.
Svetlanka [38]

Answer:

1. Generally Linkedlist is used, but you can also use the queue. Hence both linked list are queue are correct options. However, treeset is sorted and hashset is not sorted, and hence we cannot make use of the treeset. Similarly the stack cannot as well be used as a Hashset.

2. D. Additional cells in the same hashset are examined and the index is incremented by a fixed value each time.

Explanation:

The 2 deals with the linear probing, and what is meant as option in 2 is what we know as linear probing in hashset, and we do have quadratic probing and double probing as well.

6 0
3 years ago
The total cost of a DUI could be as high as----- dollars?<br> a100<br> b500<br> c1000<br> d8000
Svet_ta [14]
the answer is d because depending on your state's laws they can also and endangerment of self and others 
7 0
4 years ago
Read 2 more answers
Which describes the first step a crawler-based search engine uses to find information?
elena-14-01-66 [18.8K]
C is the correct answer to the problem
6 0
3 years ago
Read 2 more answers
Shadow systems focus on ________. a. improving the scalability of relational databases b. reducing redundancies in relational da
marusya05 [52]

Answer:

c. specific information requirements of an individual or department

Explanation:

Shadow systems is described as a system in which its major function is to get or produce specific information requirements of an individual or department.

It doesn't focus on all the organization or all the people, it simply focuses on an individual or an organization. This concentration on a specific person results to more efficiency and effectiveness.

Thia can be applied In all the different sections or department in order to yield optimal performance.

4 0
3 years ago
Other questions:
  • Which of the following can be both an input device and an output device? mouse. keyboard. display screen. laser printer .
    9·1 answer
  • How to write an shortened if statement?
    6·1 answer
  • What is the different between a computer and a phone?​
    15·1 answer
  • is either the number of bits used to indicate the color of a single pixel, or the number of bits used for each color component o
    7·1 answer
  • You are creating a database for your computer club. Most of the students live in your town, Durham. How can you make Durham appe
    11·1 answer
  • Which statement assigns the value 98 to the variable myScore in Python?
    14·2 answers
  • Which option allows users to access the handout master to modify it?
    5·1 answer
  • Complete the sentence.
    10·1 answer
  • HELPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP!!!
    12·1 answer
  • A character that <br>is raised and smaller above the baseline is called​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!