Are you studying for the CEH certification?

Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.

Upgrade Account

A network administrator discovers several unknown files in the root directory of his Linux FTP server. One of the files is a tarball, two are shell script files, and one is a binary file named nc (netcat). The logs show the user logged in anonymously, uploaded the files, extracted the contents, and ran the script using a function provided by the ftp servers software. The ps command shows that the nc file is running as process and the netstat command shows the nc process is listening on a network port. What kind of vulnerability had to have existed to make this remote attack possible?

Brute Force Login

Privilege Escalation

File system permissions

Directory Traversal

Explanation

Directory

Skillset helps you pass your certification exam.

Contributions and Interactions
Practice Questions

Study thousands of practice questions that organized by skills and ranked by difficulty.

Contributions and Interactions
Personalized Training

Create a tailored training plan based on the knowledge you already possess.

Training Video Selector
Exam Readiness

Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.

Get A Free Skillset Account