exam questions

Exam PT0-001 All Questions

View all questions & answers for the PT0-001 exam

Exam PT0-001 topic 1 question 113 discussion

Actual exam question from CompTIA's PT0-001
Question #: 113
Topic #: 1
[All PT0-001 Questions]

During an internal penetration test, several multicast and broadcast name resolution requests are observed traversing the network. Which of the following tools could be used to impersonate network resources and collect authentication requests?

  • A. Ettercap
  • B. Tcpdump
  • C. Responder
  • D. Medusa
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
mr_robot
Highly Voted 5 years ago
PenTest+ Practice Tests Book C. - In this scenario, the question specifically states “name resolution requests.” In this case, Responder is the best choice. Responder is a toolkit used to answer NetBIOS queries from Windows systems on a network. Tcpdump is a type of packet analyzer software utility that monitors and logs TCP/IP traffic passing between a network and the computer on which it is executed. Ettercap is a free and open source network security tool for man-in-the-middle attacks on LAN. Medusa is a brute-force login attack tool that supports a variety of protocols and services.
upvoted 18 times
runagerj
3 years, 7 months ago
Man-in-the-Middle Attack: The man-in-the-middle attack (abbreviated MITM, MitM, MIM, MiM, MITMA) is a form of active attack where an attacker makes a connection between the victims and send messages between them. Thus, victims think they are talking directly to each other, but actually an attacker controls it. In this scenario, an attacker has been successful when it can impersonate a user. On the other hand, a third person between you and the person with whom you are communicating exists and he can control and monitor your traffic. Fortunately, some protocols can prevent it, like SSL. A hacker can use the below software to implement this attack: Cain and Abel / Subterfuge / Ettercap / AirJack
upvoted 1 times
...
...
boblee
Highly Voted 4 years, 10 months ago
The Answer is C.
upvoted 10 times
...
miabe
Most Recent 2 years, 10 months ago
Selected Answer: C
looks good to me
upvoted 1 times
...
[Removed]
3 years, 1 month ago
took this line in the question as a reference to Responder since it does multiple protocols.. just a thought """several multicast and broadcast name resolution requests are observed traversing the network."""
upvoted 1 times
...
baybay
3 years, 1 month ago
Selected Answer: C
Responder => MDNS, LLMNR, NBT-NS, NetNTLM poisoner ...
upvoted 1 times
...
runagerj
3 years, 7 months ago
A is the answer. Ettercap is used for MiTM attacks. https://reconshell.com/ettercap-and-man-in-middle-attacks-tutorial/
upvoted 1 times
Ariel235788
3 years, 6 months ago
the question is talking about collecting the data. Ettercap is used to craft packets
upvoted 1 times
...
...
smalltech
3 years, 10 months ago
Responder is a NetBIOS Name Spoofing (NBNS) and Link-Local Multicast Name Resolution (LLMNR) spoofing tool that can capture authentication attempts to a file.
upvoted 1 times
...
D1960
4 years, 11 months ago
Maybe: A. Ettercap? Ettercap is a comprehensive suite for man in the middle attacks features: sniffing of live connections and content filtering on the fly. It supports: active and passive dissection of many protocols includes: many features for network and host analysis. Responder seems like a different sort of thing. Responder is a toolkit that is used to answer NetBIOS queries. There is no indication that NetBIOS is being used here.
upvoted 3 times
Ariel235788
3 years, 6 months ago
the question is talking about collecting the data. Ettercap is used to craft packets
upvoted 1 times
...
1_2_B_Anonymous
4 years, 4 months ago
The indication for NetBIOS being used is the "name resolution requests".
upvoted 2 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago