exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 157 discussion

Actual exam question from CompTIA's SY0-601
Question #: 157
Topic #: 1
[All SY0-601 Questions]

HOTSPOT -
An incident has occurred in the production environment.

INSTRUCTIONS -
Analyze the command outputs and identify the type of compromise.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
Hot Area:

Show Suggested Answer Hide Answer
Suggested Answer:

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
stoneface
Highly Voted 2 years, 4 months ago
Logic Bomb and Backdoor First compromise relies on a cronjob that will be executed each five minutes Second compromise is opening port 31337 , https://www.eicar.org/download/eicar.com.txt is a file to test AV products, instead of using real malware, which could cause real damage, this test file allows people to test anti-virus software without having to use a real computer virus
upvoted 84 times
rhocale
2 years, 1 month ago
this is incorrect the NC gives it away for the second one NC the rat is always listening
upvoted 2 times
hieptran
1 year, 9 months ago
wrong, netcat listener often use for reverse shell. And a reverse shell could be used for both RAT or backdoor. Since this is just a simple script and KISS -> backdoor
upvoted 3 times
...
...
varun0
2 years, 4 months ago
second compromise is opening a port which can be connected to, when you connect to it, it gives you a bash shell. I think its a RAT?
upvoted 1 times
varun0
2 years, 4 months ago
Disregard this, you are correct
upvoted 9 times
...
...
andrizo
2 years, 3 months ago
1st thought for the 1st one was sql, but maybe not
upvoted 1 times
...
stonefaces_kitten
2 years, 1 month ago
Thank you for this! I agree
upvoted 4 times
scarceanimal
1 year, 11 months ago
stoneface is a discord moderator?!
upvoted 15 times
...
...
...
[Removed]
Highly Voted 2 years, 3 months ago
To make it easy for you guys: if = logic bomb (since logic bomb execute once a condition is met) nc = rat
upvoted 23 times
Samxi92
2 years, 3 months ago
"Netcat can also establish connections with remote machines. To configure Netcat as a backdoor, you first set up a listener on the victim system (IP: 10.1.0.1) set to pipe traffic from a program, such as the command interpreter, to its handler: nc -l -p 666 -e cmd.exe" Comptia Guide
upvoted 10 times
[Removed]
2 years, 2 months ago
I'm not going to lie, I am debating whether it is either a backdoor or a rat since both are so similar because both give you access to a remote system.
upvoted 3 times
NICKJONRIPPER
2 years, 1 month ago
"file.sh" is RAT, "backdoor.sh" is backdoor
upvoted 4 times
Sandon
1 year, 12 months ago
That is incorrect
upvoted 9 times
...
...
...
J_Ark1
2 years, 2 months ago
such a comand is not present in the example so hence makes it a R.A.T
upvoted 1 times
...
...
...
AbdullahMohammad251
Most Recent 8 months ago
A condition is being used to execute a certain command -----> Logic bomb Setting up the listener to establish a reverse-shell connection is more aligned with a ---> backdoor than RATs. Compared to backdoor malware, RATs encompass more advanced features such as keystroke logging, screen capture, webcam access, and file system manipulation. RATs provide a broader sense of surveillance beyond simple command execution.
upvoted 2 times
AbdullahMohammad251
8 months ago
After the attacker gained unauthorized access to the target host, a file was downloaded and a message was displayed. This is a simple command execution, and thus a backdoor was used.
upvoted 1 times
...
...
BD69
10 months, 3 weeks ago
First has 2 answers: Logic Bomb and SQLi Second has 2 answers: RAT and Backdoor
upvoted 2 times
...
imustknow
1 year, 2 months ago
logic bomb backdoor (download file for RAT)
upvoted 2 times
...
Skymaster8182
1 year, 3 months ago
The first one makes sense is a logic bomb based on the conditions. I’m more willing to believe back door over or a RAT. Remote access Trojan usually has two files involved. Client being the remote control Server being the Trojan This method requires a target PC to run the server/Trojan which opens a specified port for the client to connect through. The client requires the IP number and port number to connect to the Trojan. The client (gui remote control) is what sends commands to the server (Trojan), the trojan receives requested commands and executes. A backdoor on the other hand can be done as easy as a script that opens a port to where you can directly access said PC. Both methods are similar, but specific differences between the two.
upvoted 1 times
...
rline63
1 year, 4 months ago
I initially thought the second one was rat. I saw someone mentioning that the second isn't really a trojan because it's not a program masquerading as something else that is installed without knowing of the malicious intent. I'm not certain but I think the second is backdoor.
upvoted 1 times
...
llUntameDll
1 year, 6 months ago
1. is Logic Bomb 2. is a backdoor (Because the script did not take control of the remote computer but rather initiated a download only. Probably in preparation for RAT execution)
upvoted 8 times
...
cvette
1 year, 7 months ago
from chatgpt: In the command output, we can see the use of the nc command with the options -1 -p 31337 -e /bin/bash. This command opens a connection to a remote server (www.eicar.org), downloads a file (eicar.com.txt), and executes it using the /bin/bash shell. This behavior is typical of a RAT, where an attacker gains unauthorized remote access to a target system and can execute commands or perform malicious activities. The RAT allows the attacker to control the infected system remotely, potentially leading to unauthorized access, data theft, or further exploitation.
upvoted 2 times
...
Kaps443
1 year, 8 months ago
Logic Bomb and Backdoor The first one is Logic Bomb because of if conditions. The second one is Backdoor because at the end it says virus downloaded. RAT is a trojan and there is a difference between a virus and a trojan. And backdoor is created with Viruses or rootkits. So the virus is mentioned here it means its should be a backdoor.
upvoted 4 times
...
MorganB
1 year, 8 months ago
MorganB 0 minutes ago Awaiting moderator approval Pass my exam 27, April 23. This question was on my test and the answer I picked was Logic Bomb and Backdoor.
upvoted 13 times
...
NerdAlert
1 year, 9 months ago
it was on the test
upvoted 7 times
...
princajen
1 year, 9 months ago
This appears to be a Logic Bomb, which is a type of cyber attack that involves planting malicious code in a program or script that lies dormant until triggered by a specific event or condition. In this case, the condition is the absence of a user named "john" in the /etc/password file. Once the condition is met, the logic bomb executes and drops the "production" database. The code is scheduled to run every hour through the crontab, making it a recurring threat. The given script seems to be a backdoor as it creates a listening port on the system which allows remote access to the shell through netcat. The downloaded virus file might contain malicious code that can be executed on the system.
upvoted 1 times
princajen
1 year, 9 months ago
The script shown in the command output is not a RAT (Remote Access Trojan) attack, but rather a script that downloads a virus file from a remote server and prints a message to the user indicating that the virus file has been downloaded. The script listens for incoming connections on port 31337 and spawns a shell (/bin/bash) for each connection, which could potentially allow an attacker to gain remote access to the system, but that does not necessarily make it a RAT attack. A RAT typically refers to a specific type of malware that provides a remote attacker with complete control over an infected system.
upvoted 1 times
...
...
stewieameh
1 year, 10 months ago
google.com/search?q=nc+-l+-p+313337+-e+%2Fbin%2Fbash%2F&oq=nc+-l+-p+313337+-e+%2Fbin%2Fbash%2F&aqs=chrome..69i57.47060j0j15&sourceid=chrome&ie=UTF-8 you might find the link helpful
upvoted 1 times
...
DJCODING
1 year, 10 months ago
please explainme which ones are correct confused reading all these comments !
upvoted 4 times
...
hsdj
1 year, 11 months ago
I looked around the internet and found that 31337 port is associated with trojans and BackOrifice (which is a backdoor hack tool). logic bomb + backdoor are my options.
upvoted 4 times
rline63
1 year, 4 months ago
Good find but 31337 is also associated with a whole suite of trojans. This is a tough question.
upvoted 1 times
...
Skymaster8182
1 year, 3 months ago
BackOrifice is a Trojan. You have to understand the differences. RATs normally require TWO files to make it work. You should go read about Netbus, Back Orifice, Sub7, HvL-RaT. All those and more are Trojans and NOT Backdoors. I used to use those RAT programs in the old days. A backdoor is more of a script that opens the doorway to access a PC. A RAT requires Both, the Client/Server to work and the target PC has to Run the Server file. Don’t confuse them. Backdoor is the better answer.
upvoted 1 times
...
...
Lyeen
2 years, 1 month ago
Logic Bomb and Rat
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago