exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 96 discussion

Actual exam question from CompTIA's SY0-601
Question #: 96
Topic #: 1
[All SY0-601 Questions]

After gaining access to a dual-homed (i.e., wired and wireless) multifunction device by exploiting a vulnerability in the device's firmware, a penetration tester then gains shell access on another networked asset. This technique is an example of:

  • A. privilege escalation.
  • B. footprinting.
  • C. persistence.
  • D. pivoting.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
stoneface
Highly Voted 2 years, 10 months ago
Selected Answer: D
Pivoting -> The act of an attacker moving from one compromised system to one or more other systems on the network
upvoted 47 times
...
Dapsie
Most Recent 1 year, 1 month ago
Initially, I chose Priviledge Escalation, but thinking through the question again, I changed my choice to Pivoting. There was the lateral movement (pivoting) before the priviledge escalation action.
upvoted 1 times
...
AbdullahMohammad251
1 year, 1 month ago
Selected Answer: D
footprinting - is done before a vulnerability is exploited. It includes gathering information about the victim to identify potential vulnerabilities. persistence - refers to the techniques used by an attacker to maintain continuous access to the victim. privilege escalation - gives the attacker access to a high-level privilege on the compromised host.
upvoted 2 times
...
LordJaraxxus
1 year, 4 months ago
Selected Answer: D
Pivoting is the process of using various tools to gain additional information. For example, imagine a tester gains access to Homer’s computer within a company’s network. The tester can then pivot and use Homer’s computer to gather information on other computers. Homer might have access to network shares filled with files on nuclear power plant operations. The tester can use Homer’s computer to collect this data and then send it back out of the network from Homer’s computer. Testers (and attackers) can use pivoting techniques to gather a wide variety of information. Many times, the tester must first use privilege escalation techniques to gain more privileges. However, after doing so, the tester can access databases (such as user accounts and password databases), email, and any other type of data stored within a network.
upvoted 1 times
...
BD69
1 year, 4 months ago
Selected Answer: A
Privilege escalation. Without privilege escalation, the pen tester couldn't get shell access! Pivoting does not mean the same thing - it's merely lateral movement with the same (usually low) credentials. While pivoting is the first thing to happen, you must escalate your privileges to get shell access.
upvoted 2 times
NetworkTester1235
1 year, 4 months ago
I think you're overthinking it, the threat actor already "exploited a vulnerability" to gain access to the network, it would make sense that they can pivot freely
upvoted 2 times
...
...
SaberZero
1 year, 5 months ago
What's Footprinting?
upvoted 2 times
...
Protract8593
1 year, 11 months ago
Selected Answer: D
In the given scenario, the penetration tester gains access to a multifunction device with both wired and wireless interfaces. Then, after exploiting a vulnerability in the device's firmware, the tester gains shell access on another networked asset. This technique is an example of "pivoting." Pivoting is a method used by attackers or penetration testers to leverage their initial access to a compromised system or network to gain access to other systems within the same network. In this case, the attacker is using the compromised multifunction device as a pivot point to gain access to other networked assets.
upvoted 3 times
...
Selected Answer: D
Pivoting is a technique used by attackers or penetration testers to move from one compromised system or network to another. In this scenario, the attacker gained access to a multifunction device through a vulnerability in its firmware. From there, they used that compromised device to gain shell access on another networked asset, essentially using the compromised device as a pivot point to access other systems or networks.
upvoted 2 times
...
MasterControlProgram
2 years, 3 months ago
Selected Answer: D
This technique is an example of "pivoting". Pivoting is a technique used by attackers to move from one compromised system to another system on the same network, or to a different network, in order to expand their access and control. In this scenario, the attacker gained access to the multifunction device and then used that as a jumping-off point to gain shell access on another networked asset. This is an example of pivoting because the attacker used the initial compromise to "pivot" to another system and expand their access.
upvoted 2 times
...
xxxdolorxxx
2 years, 5 months ago
Selected Answer: D
Pivoting is correct.
upvoted 2 times
...
Idkanything
2 years, 7 months ago
Why not privilege escalation?
upvoted 1 times
xxxdolorxxx
2 years, 5 months ago
Priv Esc is more on the same machine. Going from a user to root.
upvoted 6 times
...
privilege escalation, refers to the act of gaining higher levels of access or privileges on a system or network. While privilege escalation may occur during the attack process, it does not specifically describe the technique used in this scenario.
upvoted 2 times
...
applepieboy
2 years, 5 months ago
Nothing in the question implies the level of access the attacker has. They do however pivot to another device.
upvoted 2 times
...
BD69
1 year, 4 months ago
This confused me too. Pivoting won't get you shell access, it's just lateral movement. Trick question.
upvoted 1 times
...
...
Jossie_C
2 years, 8 months ago
Selected Answer: D
Lateral movement AKA pivoting
upvoted 2 times
...
EDSAL
2 years, 9 months ago
answer is D Pivoting
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...