exam questions

Exam PT0-001 All Questions

View all questions & answers for the PT0-001 exam

Exam PT0-001 topic 1 question 140 discussion

Actual exam question from CompTIA's PT0-001
Question #: 140
Topic #: 1
[All PT0-001 Questions]

SIMULATION -
You are a penetration tester running port scans on a server.

INSTRUCTIONS -
Part1: Given the output, construct the command that was used to generate this output from the available options.
Part2: Once the command is appropriately constructed, use the given output to identify the potential attack vectors that should be investigated further.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Part1 -


Part2 -

Show Suggested Answer Hide Answer
Suggested Answer: See explanation below.
Part 1 ג€" nmap 192.168.2.2 -sV -O
Part 2 ג€" Weak SMB file permissions

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
catastrophie
Highly Voted 4 years ago
nmap -sV -O --top-ports 100 192.168.2.2 Looking at the output you can see ports 139 and 445 are opened. This is wide open for a Null session attack.
upvoted 7 times
Bluedegard
1 year, 4 months ago
but what about Weak SMB file permission??? Linux can offer SAMBA which is similar to SMB
upvoted 1 times
...
...
hellobob
Highly Voted 4 years ago
Im going with: nmap -sV -O --top-ports 100 192.168.2.2 Tried scanning 1 host on my machine. without -sV you will not get question marks in your port services. we can also clearly see only 100 ports are being scanned. Commander123 is correct.
upvoted 5 times
...
MysterClyde
Most Recent 2 years ago
The correct answer is nmap 192.168.2.2 sV -O. You place it in this order because it is how the output was display in the shell. But placing sV and -O before the ip address is fine as well. What isn't correct are the syntaxes --top-ports=1000 or --top-ports=100 it is stated as ---top-ports 100 or --top-ports 1000. Be carful of those gotchas
upvoted 1 times
...
miabe
2 years, 11 months ago
my 2 cents: nmap -sV -O --top-ports 100 192.168.2.2 Null Session & weak SMB
upvoted 1 times
...
Cock
3 years, 3 months ago
It was on the exam
upvoted 4 times
RTFM
3 years, 3 months ago
why would you say its on the exam and then give no feedback. please share your thoughts
upvoted 2 times
...
...
FlowerPowers
3 years, 8 months ago
I believe the potential attack vectors for the second part are: Null session enumeration Weak SMB file permissions ARP spoofing
upvoted 2 times
FlowerPowers
3 years, 8 months ago
Nevermind, I think the possible attack vectors are just null session enumeration and ARP spoofing. Linux doesn't use SMB.
upvoted 2 times
likeahoss
3 years, 7 months ago
Do they not? I thought they did and just called it something else. Samba maybe?
upvoted 4 times
...
Bluedegard
1 year, 4 months ago
Nope! Linux can still use SMB (which is SAMBA) and it make windows clients can simply understand that this is SMB and can traverse to that directory.
upvoted 1 times
...
...
...
g4nt3ng
3 years, 10 months ago
how about this? nmap --top-ports=100 -Pn -O -sV 192.168.2.2 is this correct?
upvoted 2 times
...
Bill_nye_russian_guy
3 years, 11 months ago
for sure is nmap -sV -O --top-ports 100 192.168.2.2 So you can see in the output it says "OS and Service detection performed" ( aka -sV and -O) by default nmap scans the top 1000 ports so they had to specifiy --top-ports 100, it shows 4 ports and at the top of the output says 96 closed ports. Second part: I agree that this is wide open for a Null session attack, but also we should look into weak smb file permissions. If they are just read they cant do much with this, but if its write we can do quite a bit. -- https://care.qumulo.com/hc/en-us/articles/360011328533-SMB-Share-Permissions
upvoted 5 times
...
hellobob
4 years ago
For the Second part i would go Null session. Once we identify the Netbios port being up we can use commands such as nbtstat to identify any null sessions.
upvoted 2 times
...
Commander123
4 years ago
The command should include top-ports=100 since the number of closed ports is 96. By default nmap scans for 1000 ports
upvoted 2 times
xriddle
4 years ago
hmm interesting ... what about part 2 why not nul session ?
upvoted 2 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...