exam questions

Exam PT0-001 All Questions

View all questions & answers for the PT0-001 exam

Exam PT0-001 topic 1 question 102 discussion

Actual exam question from CompTIA's PT0-001
Question #: 102
Topic #: 1
[All PT0-001 Questions]

A company hires a penetration tester to determine if there are any vulnerabilities in its new VPN concentrator installation with an external IP of 100.170.60.5.
Which of the following commands will test if the VPN is available?

  • A. fpipe.exe -1 8080 -r 80 100.170.60.5
  • B. ike-scan -A -t 1 --sourceip=spoof_ip 100.170.60.5
  • C. nmap -sS -A -f 100.170.60.5
  • D. nc 100.170.60.5 8080 /bin/sh
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
mr_robot
Highly Voted 5 years ago
I would go for B. "ike-scan is a command-line IPSec VPN Scanner & Testing Tool for discovering, fingerprinting and testing IPsec VPN systems." https://www.darknet.org.uk/2008/11/ike-scan-ipsec-vpn-scanner-testing-tool/ https://docs.paloaltonetworks.com/pan-os/7-1/pan-os-admin/vpns/site-to-site-vpn-concepts/set-up-site-to-site-vpn/test-vpn-connectivity https://subscription.packtpub.com/book/networking_and_servers/9781787121829/1/ch01lvl1sec17/pentesting-vpn-s-ike-scan
upvoted 7 times
MrRiver
3 years, 8 months ago
a.) fpipe ... is a tool to somehow redirect local ports d.) nc (netcat) you just connect to one port, this does not give you enought info ... and the bin/bash at the end is missplace so i would not work anyway b.) is the Trap answer: ike-scan is indeed used to scan IP-Sec based VPN server. But Spoiler: Not all VPN Use IP-Sec ... like Cisco Anyconnect users SSL and open-vpn also works diffrent. But what realy kills B is the wrong syntax and the spoofing: there is a -sourceip option . But it only accepts an doted ip address or the value "random" Anyway even if the syntax was right and it would would use a "Random" source adress ... no packets would be returned to you ... because its not your source address ... so you wont get any info if the service is up or down http://www.royhills.co.uk/wiki/index.php/Ike-scan_help_output
upvoted 2 times
dustercan
3 years, 8 months ago
After looking into this I agree with you. Found on https://www.systutorials.com/docs/linux/man/1-ike-scan/ --sourceip=<s> Set source IP address for outgoing packets to <s>. This option causes the outgoing IKE packets to have the specified source IP address. The address can either be an IP address in dotted quad format, or the string "random" which will use a different random source address for each packet that is sent. If this option is used, no packets will be received This option requires raw socket support, and you will need superuser privileges to use this option, even if you specify a high source port. This option does not work on all operating systems.
upvoted 1 times
...
...
...
miabe
Most Recent 2 years, 10 months ago
Selected Answer: C
looks good to me
upvoted 1 times
...
anonamphibian
3 years, 2 months ago
spoof_ip is not a valid source ip...
upvoted 1 times
...
runagerj
3 years, 7 months ago
Why is it that I see a lot of people say these answers are wrong but when I search the question it's the same as it is on this site. So are all these questions answered wrong by all of the other sites as well, are people trying to throw others off on this site for some reason or maybe overthinking it? I'm a bit frustrated as to what the correct answers are most of the time.
upvoted 2 times
mattlai
3 years, 2 months ago
all came from one same source
upvoted 1 times
...
rose_y
3 years, 7 months ago
Literally all the other sites you see copy from this one, mistypes and all. So yes, the answer is wrong on all of them.
upvoted 3 times
...
9SH4
3 years, 7 months ago
Have you taken the test ? if so were the questions similar?
upvoted 1 times
...
...
MrRiver
3 years, 8 months ago
niceeee tricky question ... after 20 Minutes or so im pretty sure it's C. good old nmap Why you propably ask ? Nmap Syntax seems correct ... -A: Enable OS detection, version detection, script scanning, and traceroute -f; --mtu <val>: fragment packets (optionally w/given MTU) Scripts and OS Detection and tracerout should give you good information if the host is UP.
upvoted 2 times
MrRiver
3 years, 8 months ago
a.) fpipe ... is a tool to somehow redirect local ports d.) nc (netcat) you just connect to one port, this does not give you enought info ... and the bin/bash at the end is missplace so i would not work anyway b.) is the Trap answer: ike-scan is indeed used to scan IP-Sec based VPN server. But Spoiler: Not all VPN Use IP-Sec ... like Cisco Anyconnect users SSL and open-vpn also works diffrent. But what realy kills B is the wrong syntax and the spoofing: there is a -sourceip option . But it only accepts an doted ip address or the value "random" Anyway even if the syntax was right and it would would use a "Random" source adress ... no packets would be returned to you ... because its not your source address ... so you wont get any info if the service is up or down http://www.royhills.co.uk/wiki/index.php/Ike-scan_help_output
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago