exam questions

Exam PT0-001 All Questions

View all questions & answers for the PT0-001 exam

Exam PT0-001 topic 1 question 83 discussion

Actual exam question from CompTIA's PT0-001
Question #: 83
Topic #: 1
[All PT0-001 Questions]

Click the exhibit button.

Given the Nikto vulnerability, scan output shown in the exhibit, which of the following exploitation techniques might be used to exploit the target system? (Choose two.)

  • A. Arbitrary code execution
  • B. Session hijacking
  • C. SQL injection
  • D. Login credential brute-forcing
  • E. Cross-site request forgery
Show Suggested Answer Hide Answer
Suggested Answer: BD 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
miabe
2 years, 10 months ago
Selected Answer: AB
looks good to me
upvoted 1 times
...
Cock
3 years, 2 months ago
It was on the exam
upvoted 2 times
...
SciBer
3 years, 6 months ago
A. and B. - According to Wikipedia, XST can be used to get cookies. Cookies can be exploited in session hijacking. "XST scripts exploit ActiveX, Flash, or any other controls that allow executing an HTTP TRACE request. The HTTP TRACE response includes all the HTTP headers, including authentication data and HTTP cookie contents, which are then available to the script. In combination with cross-domain access flaws in web browsers, the exploit can collect the cached credentials of any website, including those utilizing SSL. - https://en.wikipedia.org/wiki/Cross-site_tracing Cross-Site Tracing (XST): - https://owasp.org/www-community/attacks/Cross_Site_Tracing - https://capec.mitre.org/data/definitions/107.html Arbitrary code execution: - https://www.kb.cert.org/vuls/id/520827/
upvoted 2 times
Ariel235788
3 years, 4 months ago
You would want D to completely hijack the server. sending exploit code wouldnt 100% always always overtake it. exploit code would do various things
upvoted 1 times
...
...
versun
3 years, 10 months ago
Answer is BD,because: A. Arbitrary code execution ---> OSVDB-:/dvwa/?-s B. Session hijacking ---> OSVDB-877 OSVDB-12184 C. SQL injection ---> OSVDB-:/dvwa/?-s D. Login credential brute-forcing ---> many OSVDB (dictionary and login page) E. Cross-site request forgery ---> OSVDB-:/dvwa/?-s
upvoted 4 times
...
hellobob
3 years, 11 months ago
Going with A and B with this one based on the Screenshot
upvoted 4 times
...
dyers
3 years, 12 months ago
I don't see anything that indicates session hijacking, brute force I can see since there is a login page but I'd say the next one would be code execution since it appears the php source code can be viewed which "may allow command execution"
upvoted 2 times
CapCrunch
3 years, 10 months ago
B due to the XST vulnerability How XST could be used for Session hijacking: https://owasp.org/www-community/attacks/Cross_Site_Tracing
upvoted 3 times
CapCrunch
3 years, 10 months ago
D due to the admin login page Example: https://securitytutorials.co.uk/brute-forcing-web-logins-with-dvwa/
upvoted 2 times
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago