Exploit Adaptation Flashcards

(12 cards)

1
Q

A public exploit says it works for version X.Y but your target is X.Y+1. Best next step?

A

Validate vulnerability behavior and adjust exploit assumptions; don’t assume minor version means safe/vuln.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Exploit needs a hardcoded callback IP. Why does it fail in labs sometimes?

A

Wrong LHOST/LPORT or NAT/VPN interface mismatch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Your reverse shell connects but immediately dies. What do you do?

A

Try a more stable payload/transport, check firewall/EDR, and stabilize the shell.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Exploit script is Python 2 and fails on Python 3. What’s the safest approach?

A

Port minimally (print/bytes), test incrementally, and document changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Exploit requires a specific URL path that 404s. What does that suggest?

A

Different app layout/config; re-enumerate to find correct endpoint and update exploit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You suspect a buffer overflow requires specific bad-char handling. What’s the key next step?

A

Identify bad chars via controlled tests and regenerate payload accordingly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Your exploit works only once; then service crashes/restarts. How report?

A

Document exact conditions, impact risk, and recommend safer validation/remediation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You can get code execution but only as low-priv user. What’s next?

A

Shift to privilege escalation enumeration immediately; don’t over-focus on initial exploit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You need to automate parsing of 1000 directories for interesting files. What’s best?

A

Write a small script to filter for keywords/extensions and log hits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You have multiple possible exploits. How choose?

A

Prefer the simplest, least disruptive, most reliable path with clear evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Your exploit requires compilation on target. What do you consider?

A

Tool availability, permissions, and whether compiling is allowed/feasible; prefer prebuilt minimal binaries when permitted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A Metasploit module exists, but you can do it manually. Which is better for OSCP?

A

Either can be allowed, but manual understanding and clear documentation often reduces surprises and improves reporting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly