Investigate Web Attack

Investigate Web Attack


LetsDefend

Which automated scan tool did attacker use for web reconnaissance?

A) Nikto

ssh_command.

After web reconnaissance activity, which technique did attacker use for directory listing discovery? A) Directory Brute Force

What is the third attack type after directory listing discovery? A) Yes

ssh_command.

Is the third attack successful?

A) Yes

ssh_command.

What is the name of fourth attack? A) Code injection

ssh_command.

What is the first payload for 4th attack? a)whoami

ssh_command.

Is there any persistency clue for the victim machine in the log file ? If yes, what is the related payload? A)%27net%20user%20hacker%20Asd123!!%20/add%27

© 2026 Cu3rv0x