exam questions

Exam PT0-001 All Questions

View all questions & answers for the PT0-001 exam

Exam PT0-001 topic 1 question 67 discussion

Actual exam question from CompTIA's PT0-001
Question #: 67
Topic #: 1
[All PT0-001 Questions]

In a physical penetration tester testing scenario. the penetration tester obtains physical access to a laptop. The laptop is logged in but locked. Which of the following is a potential NEXT step to extract credentials from the device?

  • A. Brute force the user's password.
  • B. Perform an ARP spoofing attack.
  • C. Leverage the BeEF framework to capture credentials.
  • D. Conduct LLMNR/NETBIOS-ns poisoning.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
miabe
2 years, 10 months ago
Selected Answer: A
looks good to me
upvoted 1 times
...
baybay
3 years, 2 months ago
Selected Answer: A
. BeEF deals with browser penetrations. LLMNR/NetBIOS deals with DNS. MITM comes to mind with ARP. That's leaves Bruteforce.
upvoted 1 times
...
cvMikazuki
3 years, 7 months ago
Its A.
upvoted 1 times
...
MrRiver
3 years, 8 months ago
Well ... not 100% clear ... C. Beef is out of scope because you cant make the maschine visit a website A. Also seems not true, because if i get a running System into my hands i wanna make the most out of it ... Imagin you shut it down and the harddrive is encrypted ... On the other handy, typing in password guesses by hand won't be that great. Wich leaves us with B and D. ARP Spoofing makes only sense if you do a MITM Attack, so would need to connect for example your latop in between the device and the corpareted network. But Questions Says nothing about the network. So i think the question goes for LMNR Poisening with something like Responder, wich can be implemented even on a Raspberry pi Zero wich emulates a NIC when you plug it in via USB. And when you do a arp spoof with no network on the other end you need to emulate DNS ... well all doable with impacket and other tool but out of the Pentest+ Scope ... So the Odds for D a very very high ;)
upvoted 1 times
Ariel235788
3 years, 6 months ago
how are you going to do that with the laptop locked up?
upvoted 2 times
...
...
rohog
3 years, 11 months ago
D. This will help. https://www.cynet.com/attack-techniques-hands-on/llmnr-nbt-ns-poisoning-and-credential-access-using-responder/
upvoted 3 times
...
byrne
4 years, 5 months ago
A. Brute force the user's password.- If Bitlocker is not enabled, we might boot a live OS and bruteforce the password with rainbow tables. Still not sure laptop BIOS would let us boot our OS. C. Leverage the BeEF framework to capture credentials.- BeEF is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser. So, what can we do with a locked windows. Simply change the network connection, for example, connecting to a evil twin, therefore using a MITM attack. I'd say the key word on this question is 'laptop', which implies wifi connection. Then, I'd quick connect the laptop to an wifi AP I set up, and I'd discover the laptop MAC address. This is silly because I can sniff wifi traffic so I'd know the MAC address and I'd perform an ARP attack. B. Perform an ARP spoofing attack. So, I'd go for D and the MITM theory. D. Conduct LLMNR/NETBIOS-ns poisoning. (anyways in a Active Directory environment, in theory, changing/managing wifi might be disabled by Group Policies) Once more, this is not a 100% the right answer thanks to Comptia's brightest minds working together behind Pentest+ questions.
upvoted 3 times
someguy1393
4 years, 5 months ago
How can it be connected to a new AP if you can't log in to make the connection?
upvoted 1 times
TheThreatGuy
4 years, 4 months ago
I think what we are missing here is that the device is already logged in. WIth that in mind, we should just be able to sniff the existing connection, right?
upvoted 1 times
...
byrne
4 years, 2 months ago
try it for yourself. lock your windows, and when requested for user/pass just click on the wifi icon and connect to the AP of your choice. Imagine that you have your laptop and you need to connect to a corporate wifi in order to use your AD creds.
upvoted 2 times
...
...
...
MikeHunt
5 years ago
brute forcing the system will lock it out and cause suspicion. But if you MITM the system and wait for the user to authenticate the system will send a user/hash out that can be used to either replay or brute force offline
upvoted 2 times
D1960
5 years ago
If I have physical access to your laptop, but I cannot login, then how do I MITM the system?
upvoted 1 times
...
D1960
5 years ago
If I have physical access, I can - possibly - reboot the system to a cdrom or thumbdrive with John-the-Ripper on it. Using that I can gain the user's local credentials. I have actually done this for users that forgot their passwords.
upvoted 6 times
...
...
mr_robot
5 years, 1 month ago
PenTest+ Practice Tests Book - SYBEX D. - Link Local Multicast Name Resolution (LLMNR) and NetBIOS Name Service (NetBIOS-NS) poisoning can provide penetration testers with the ability to obtain a man-in-the-middle position, broadening their ability to gain access and information. One of the most commonly targeted services in a Windows network is NetBIOS. NetBIOS is commonly used for file sharing.
upvoted 3 times
...
D1960
5 years, 2 months ago
"A" seems to make sense. But according to Sybex Comptia PenTest+ Practice Test - Chapter 3 Question 190: the answer is "D"
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...