exam questions

Exam PT0-002 All Questions

View all questions & answers for the PT0-002 exam

Exam PT0-002 topic 1 question 366 discussion

Actual exam question from CompTIA's PT0-002
Question #: 366
Topic #: 1
[All PT0-002 Questions]

A penetration tester captures SMB network traffic and discovers that users are mistyping the name of a fileshare server. This causes the workstations to send out requests attempting to resolve the fileshare server’s name. Which of the following is the best way for a penetration tester to exploit this situation?

  • A. Relay the traffic to the real file server and steal documents as they pass through
  • B. Host a malicious file to compromise the workstation
  • C. Reply to the broadcasts with a fake IP address to deny access to the real file server
  • D. Respond to the requests with the tester's IP address and steal authentication credentials
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
BlackSkullz
5 months, 3 weeks ago
Selected Answer: D
By using tools like Responder, the tester could intercept the resolution requests and respond with his/her IP address to tell the workstations "Hey! I'm the file share you're looking for!" This would then lead to the workstations attempting to authenticate to the tester's IP
upvoted 1 times
...
Nikamy
5 months, 3 weeks ago
Selected Answer: D
D. Respond to the requests with the tester's IP address and steal authentication credentials When users mistype the name of a fileshare server, their workstations attempt to resolve the server name through network requests. A penetration tester can exploit this situation by responding to these requests with their own IP address (using tools like Responder or Metasploit SMB relay modules) to capture authentication credentials, such as hashed passwords. This technique exploits weaknesses in the SMB protocol and is a common method for capturing NTLM hashes, which can be cracked offline or relayed to gain access to other systems.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago