1. Right Answer: B
Explanation: The described tool is searchsploit. Searchsploit and its finer details should be of closer familiarization to Penetration testers as the ability to rapidly search for, identify and obtain exploit code is of great concern in a penetration test.
2. Right Answer: B
Explanation: A dynamic proxy is established by using the -D flag in SSH; all of the network traffic of a penetration tester through port 8888 is proxied. Commands are run against systems that may be visible from the system but not from the attacker-s system. Much of a penetration tester-s ability is facilitated by this immensely powerful tool to pivot through networks and move deeper into a target organization-s network.
3. Right Answer: C
Explanation: A penetration tester is enabled to proxy all network traffic by Proxychains through an established SOCKS proxy, like creating via SSH tunneling with the -D command.
4. Right Answer: B
Explanation: A simple and effective way to ensure persistence of connectivity is by installing a public SSH key in a user-s authorized keys file, after a target system is compromised. By using SSH as a connection protocol, it is guaranteed that a penetration tester-s traffic is not only encrypted but also blends in with other legitimate users. In this process, a netcat listener is bound to port 4444.
5. Right Answer: D
Explanation: Findbugs is a described tool that is currently known as Spotbugs. The University of Maryland developed Findbugs as a static code analyzer for Java applications, specifically. The spiritual successor of Findbugs, Spotbugs, can be taken to be a deprecated product updated in 2015. Spotbugs is in current development and has a very robust community in place.