Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam 312-50 topic 8 question 87 discussion

Actual exam question from ECCouncil's 312-50
Question #: 87
Topic #: 8
[All 312-50 Questions]

A network administrator discovers several unknown files in the root directory of his Linux FTP server. One of the files is a tarball, two are shell script files, and the third is a binary file is named "nc." The FTP server's access logs show that the anonymous user account logged in to the server, uploaded the files, and extracted the contents of the tarball and ran the script using a function provided by the FTP server's software. The ps command shows that the nc file is running as process, and the netstat command shows the nc process is listening on a network port.
What kind of vulnerability must be present to make this remote attack possible?

  • A. File system permissions
  • B. Privilege escalation
  • C. Directory traversal
  • D. Brute force login A
Show Suggested Answer Hide Answer
Suggested Answer: Explanation 🗳️
To upload files the user must have proper write file permissions.
References: http://codex.wordpress.org/Hardening_WordPress

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Pragdeashwar
1 week, 1 day ago
File System Permission, it is the weakness that allowed adversary to copy malicious file also allowed to execute it.
upvoted 1 times
...
Luukman
2 years, 7 months ago
Ftp users don’t have permissions to start processes. Privelige escalation is needed to achieve this
upvoted 1 times
...
Sasiron
3 years, 4 months ago
File system permissions is correct
upvoted 1 times
...
amal1302
3 years, 6 months ago
To upload files user needs file permissions
upvoted 2 times
...
youngins
4 years ago
A. file permission
upvoted 2 times
...
youngins
4 years ago
Privilege Escalation
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...