exam questions

Exam PT0-001 All Questions

View all questions & answers for the PT0-001 exam

Exam PT0-001 topic 1 question 22 discussion

Actual exam question from CompTIA's PT0-001
Question #: 22
Topic #: 1
[All PT0-001 Questions]

A security consultant is trying to attack a device with a previously identified user account.

Which of the following types of attacks is being executed?

  • A. Credential dump attack
  • B. DLL injection attack
  • C. Reverse shell attack
  • D. Pass the hash attack
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
mr_robot
Highly Voted 5 years, 2 months ago
PenTest+ Practice Tests Book - SYBEX D. - In this scenario, the tester is using the Metasploit PSEXEC module. Using Metasploit, a tester can exploit a system and perform a hash dump to extract the systems hashes. The tester can then use the PSEXEC module to pass the hash to another system on the network. The example shows how the SMBPASS option is set and the pass-the-hash attack executed, resulting in access to a remote system within the network. A pass-the-hash attack is an exploit in which a tester takes a hashed user credential and, without cracking it, reuses it to deceive an authentication system into creating a new authenticated session on the same network.
upvoted 14 times
...
boblee
Highly Voted 5 years ago
the answer for D1960 question is A. the answer for this is D
upvoted 5 times
...
miabe
Most Recent 2 years, 11 months ago
Selected Answer: D
looks good to me
upvoted 1 times
...
Cock
3 years, 4 months ago
It was on the exam
upvoted 1 times
...
EZPASS
4 years, 6 months ago
I believe the correct answer is D.
upvoted 2 times
...
[Removed]
4 years, 10 months ago
I think pass the hash because we already known the hash and going to compromise another machines.
upvoted 2 times
...
D1960
5 years, 1 month ago
Another pass-the-hash question you may in your future. I would be interested in any options. I think the correct answer is A. But I am not sure: .... A penetration tester successfully exploits a Windows host and dumps the hashes Which of the following hashes can the penetration tester use to perform a pass-the-hash attack? A. administrator:500:d9cOaa9ec7b349nef012bbc991de07a8:654bdc65adf9814bc6Seabh296044cab B. Administratar:500:aad3k3435b51404ezaad3b435b$1404set31d6cfeed16ae931b73c59d7e0c089c0:dfc312aeed121 C. Administrator:$NTLM$11223344 D. Administrator:$NTLMv2SNTLMV2WORKGROUP$11223344”$67708$0/659A550D5E9D02996DrD95:8/EC105501010000 6000000000ECF6385874CA01133610802D49732DDO00000000200120
upvoted 2 times
...
GOKU1984
5 years, 3 months ago
D. The answer is in the name, instead of trying to crack the hash ..use the hash as the password
upvoted 4 times
...
D1960
5 years, 3 months ago
Maybe: A. Credential dump attack ? There as a password hash.
upvoted 1 times
who__cares123456789___
4 years, 4 months ago
Credential dump was already done, Now dumped creds are feed to this exploit and will be passed to victim system...now pass me the hash...and a lighter!! clowns
upvoted 2 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...