Linux attack test questions

Source: Internet
Author: User


Google search is expected to test all the questions on its own and occasionally ask related questions when recruiting linux engineers! Hope to bring you some convenience

 

1. How can I log on to the system and disable history operation commands?
2. ssh limits ip login and requires ssh Login. What should I do?
3. Which of the following commands can be used to display the ssh backdoors accurately when the other party does not see logon?
4. How to get the real tty
5. How to use telnet for reverse connection
6. I need to download a batch of exp, all named xxx1.c xxx2.c ..... Xxx50.c. Please give a command to complete the download
7. In Windows, NC listens to linux and returns the shell command. The command cannot be properly wrapped. How can this problem be solved?
8. Write a bash Privilege Escalation command.
9. Write six commands for ssh and plink tunnel Forwarding (local, remote, dynamic ).
10. Can the local rootshell use bash and tcsh?
11. Please refer to the three tools used to step on dns in linux.
12. How to Use bash for bounce, port scanning and download, and provide specific statements
13. How to view and utilize host sharing
14. Briefly describe the bash Command Execution Process, and use bash to hijack the su command to implement the password record function.
15. For the stepping stone, we may need to use ssh on the local machine to access other machines, but what about the public key of other machines? Cannot be stored in the current user's directory? Of course, you can delete it after the event, but what should you do if there is more than one thing less? It is required that even common users cannot be seen by the logon administrator.
16. It is not advisable to delete rm files. The correct method for deleting files is
17. How can I modify the timestamp of a file?
18. list more than three port redirection tools
19. There is a tool that allows you to get twice the result with half the effort during Intranet penetration. Make your computer belong to the Intranet status of the other party. Please name the tool.
20. ubuntu common user logon graphic interface, how to log on as root without knowing the root password
21. How to download/var/www/config. php of 192.168.1.2 during rsync penetration
22. If you accidentally log on to history to record a command, what method will you take to handle it?
23. instructions on how to use sslstrip and ettercap to break through the ssl sniffing Password
24. now I am working with a computer on the Intranet. the ip address of the other party is 192.168.1.2. He is searching for information online. Please use ettercap to obtain the permission of the other party in the shortest time. What will you do, you don't need to write it in detail. You can simply understand it.
25. How can I remotely connect metasploit on the home Intranet to my company?
26. In linux, what should I do if the terminal server exceeds the maximum allowed connection and how to hide the client name displayed on the recipient's computer?
27. When you know that other hackers are logging on to ssh
28. The other apache directory has the webdav vulnerability. You must use a linux Command to connect to the directory and have the permission to upload the shell. Which command is used?
29. How to encrypt a compressed package in linux
30. What is the first thing you need to do when logging on to a zombie to find information?
31. Please list the ip address of the other party in a command, as long as the Internet ip address (as long as the Digital ip address, understand ?)
32. Describe the location where apache and nginx configuration files are stored. You just need to specify four paths.
32. Disable all command functions in disable_function. What effective methods will you use to break through?
33. In addition to creating temporary directories, do you have a better way?
34. A website has a local Inclusion Vulnerability and cannot contain shells. In addition, the injection has root permissions, and cannot write shell, no background, and no load_file. This is a pure abnormal server, how do you configure the ftp server with pam_mysql + vsftpd
35. Please describe at least three comprehensive vulnerability scanners in linux
36. Please note that at least two types of web configurations can cause the local root bug.
37. List at least three types of services that can mark user accounts on the system and three software that can be cracked by brute force.
38. data driven attack: the two types of attacks, and a brief example
39. Can ftp logon overflow be performed? How can commands be written in a centralized manner?
40. list two sendmail attack methods and webshell retention methods.
41. What are the usage methods of rhosts and xterm?
42. For details about dns hijacking in linux, refer
43. If overflow fails, please list at least 6 categories and 9 methods for obtaining root permissions.
44. List 5 rootkits and describe their respective features
45. How to add users with uid 0 to Linux
46. Instructions on how to sniff the vpn account and password

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.