Identifying CVEs to Gain Execution on a Linux Server with SSHD

Identifying CVEs for Gaining Execution on a Linux Server with SSHD

Question

A penetration tester wants to identify CVEs that can be leveraged to gain execution on a Linux server that has an SSHD running.

Which of the following would BEST support this task?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

D.

To identify CVEs that can be leveraged to gain execution on a Linux server with SSHD running, the BEST option among the given choices is to run nmap with the "--script vulners" option set against the target, which is Option C.

Option A suggests running nmap with the "-o," "-p22," and "-sC" options set against the target. These options would only perform an OS detection scan, scan for port 22 (which is SSHD's default port), and run default scripts respectively. While these options could be useful in identifying open ports and running scripts, they do not specifically focus on identifying CVEs.

Option B suggests running nmap with the "-sV" and "-p22" options set against the target. These options would perform a version detection scan on port 22, which could identify the version of SSHD running on the target. While this could be useful in identifying potential vulnerabilities associated with that version, it would not necessarily identify other CVEs that could be exploited to gain execution on the server.

Option D suggests running nmap with the "-sA" option set against the target, which would perform a TCP ACK scan. While this could identify whether the server is protected by a firewall, it would not necessarily identify CVEs that could be leveraged to gain execution on the server.

Option C suggests running nmap with the "--script vulners" option set against the target. This option would perform a scan using the vulners.nse script, which is designed to identify known vulnerabilities and exploits associated with various services and applications, including SSHD. This scan could identify CVEs that could be leveraged to gain execution on the Linux server.

In summary, Option C is the BEST choice because it specifically targets identifying vulnerabilities associated with SSHD, which is the service running on the target server.