John has a proxy server on his network which caches and filters web access. He shuts down all unnecessary ports and services. Additionally, he has installed a firewall (Cisco PIX) that will not allow users to connect to any outbound ports. Jack, a network user has successfully connected to a remote server on port 80 using netcat. He could in turn drop a shell from the remote machine. Assuming an attacker wants to penetrate John’s network, which of the following options is he likely to choose?

Posted by: Pdfprep Category: CEH-001 Tags: , ,

John has a proxy server on his network which caches and filters web access. He shuts down all unnecessary ports and services. Additionally, he has installed a firewall (Cisco PIX) that will not allow users to connect to any outbound ports. Jack, a network user has successfully connected to a remote server on port 80 using netcat. He could in turn drop a shell from the remote machine. Assuming an attacker wants to penetrate John’s network, which of the following options is he likely to choose?
A . Use ClosedVPN
B . Use Monkey shell
C . Use reverse shell using FTP protocol
D . Use HTTPTunnel or Stunnel on port 80 and 443

Answer: D

Explanation:

As long as you allow http or https traffic attacks can be tunneled over those protocols with Stunnel or HTTPTunnel.

Leave a Reply

Your email address will not be published.