Search Header Logo

Late Walkthrough

Authored by Hack Ottawa

Computers

Professional Development

Used 1+ times

Late Walkthrough
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which tool was used to monitor running processes?

pspy

wireshark

nmap

Burp Suite

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which vulnerability was initially exploited?

SQL Injection

XSS

SSTI

HTTP Request Smuggling

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which tool was used to create the images that were uploaded?

Gimp

ImageMagick

Photoshop

Tux Paint

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which payload was used to test for the SSTI vulnerability?

Foo: xGET /home HTTP/1.1

' OR 1=1 --

<script>alert(1)</script>

{{ 7 * 7 }}

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was the name of the tool used to assist with privilege escalation?

Linpeas

Winpeas

LinEnum

Smashed Potato

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?