exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 208 discussion

Actual exam question from CompTIA's SY0-601
Question #: 208
Topic #: 1
[All SY0-601 Questions]

An analyst is reviewing logs associated with an attack. The logs indicate an attacker downloaded a malicious file that was quarantined by the AV solution. The attacker utilized a local non-administrative account to restore the malicious file to a new location. The file was then used by another process to execute a payload.
Which of the following attacks did the analyst observe?

  • A. Privilege escalation
  • B. Request forgeries
  • C. Injection
  • D. Replay attack
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
stoneface
Highly Voted 2 years, 10 months ago
Selected Answer: C
"The file was then used by another process to execute a payload." -> Injection
upvoted 72 times
stonefaces_kitten
2 years, 7 months ago
I agree, thank you (:
upvoted 19 times
i_luv_stoneface
2 years, 4 months ago
my daddy is right
upvoted 36 times
stonefacegroupie1
2 years, 1 month ago
I concur with the almighty
upvoted 17 times
...
...
...
cannon
1 year, 5 months ago
IMHO - Because it does not explicitly say or imply that the attacker obtained "privilege escalation" this would likely be scored as C. Injection" (in CompTIA's silly mind). Here is how = they could have copied the file to a drive that is excluded from the AV security suite, such as a USB or network drive using the non-administrative account. And then run the malicious code.
upvoted 1 times
RamnathKM
1 year, 3 months ago
Here is the article that I wrote in C++ of how to perform dll code injection. https://www.codeproject.com/Tips/5369555/Inject-DLL-in-Another-Process-using-Cplusplus-Win3
upvoted 2 times
...
...
...
Ahmed_aldouky
Highly Voted 2 years, 3 months ago
's difficult to say which attack is more likely based on the scenario provided, as both privilege escalation and injection could be possible explanations for the behavior observed in the logs. On one hand, the fact that the attacker was able to restore the quarantined file to a new location using a non-administrative account suggests that they may have exploited a privilege escalation vulnerability. On the other hand, the fact that the attacker was able to bypass the AV solution and execute the payload using the restored file suggests that they may have injected malicious code into the file. Therefore, without additional information or context, it's difficult to determine which attack is more likely. It's possible that both attacks were used in combination to achieve the final outcome observed in the logs.
upvoted 11 times
...
c56e966
Most Recent 1 year, 1 month ago
A. Privilege escalation. Privilege escalation involves an attacker gaining unauthorized access to higher levels of privileges or permissions on a system or network. In this scenario, the attacker initially operated with limited privileges using a non-administrative account. However, by restoring the quarantined malicious file to a new location and executing it with another process, the attacker was able to escalate their privileges to execute the payload, potentially gaining higher levels of access or control over the system.
upvoted 1 times
...
_deleteme_
1 year, 4 months ago
A - The Anti-Virus (AV) quarantined. It became an attack when a user gained access to move it and put it somewhere so it can be executed. Privilege does not have to mean admin, see below. Privilege Escalation (Per Dion Training) ▪ Occurs when a user is able to gain the rights of another user or administrator ▪ Vertical Privilege Escalation ▪ Horizontal Privilege Escalation
upvoted 1 times
Payu1994
1 year, 4 months ago
In the scenario described, the attacker restored a quarantined file (which is already on the system) and then used another process to execute a payload. This is more indicative of a privilege escalation attack, where the attacker gains access to privileges that they should not normally have, allowing them to perform actions (like restoring a quarantined file and executing a payload) that a regular user wouldn’t be able to do.
upvoted 1 times
...
...
maggie22
1 year, 5 months ago
Selected Answer: C
The subject here is about the "FILE" not the privilege.
upvoted 2 times
...
TheExile
1 year, 6 months ago
Selected Answer: A
You guys are trolling this is definitely a privilege escalation. Privileges were elevated from a non-administrative user account to a system process account that could execute the file payload. according to the ComapTIA student textbook: Vertical privilege escalation (or elevation) is where a user or application can access functionality or data that should not be available to them. For instance, a process might run with local administrator privileges, but a vulnerability allows the arbitrary code to run with higher system privileges.
upvoted 3 times
Mavman42
1 year, 5 months ago
How can it be privilege escalation when there was no escalation? "The attacker utilized a local non-administrative account..."
upvoted 2 times
Payu1994
1 year, 4 months ago
In the scenario described, the attacker restored a quarantined file (which is already on the system) and then used another process to execute a payload. This is more indicative of a privilege escalation attack, where the attacker gains access to privileges that they should not normally have, allowing them to perform actions (like restoring a quarantined file and executing a payload) that a regular user wouldn’t be able to do.
upvoted 1 times
...
...
...
TheFivePips
1 year, 7 months ago
Selected Answer: C
No escalation was present. Injection for sure
upvoted 3 times
...
Synnister
1 year, 8 months ago
Selected Answer: C
C: This one tripped me up but this is why I think it's C. They state "The logs indicate an attacker downloaded a malicious file that was quarantined by the AV solution." Cool, bad guy downloaded thing. "The attacker utilized a local non-administrative account to restore the malicious file to a new location." Here is where I THOUGHT priv escalation, but it doesn't state that he moved from one to another; it states what the attacker used "a local non admin account", not that they switched from one account to another or anything. I could be wrong of course, but that's what I am understanding. Hope that helps :D
upvoted 1 times
Payu1994
1 year, 4 months ago
In the scenario described, the attacker restored a quarantined file (which is already on the system) and then used another process to execute a payload. This is more indicative of a privilege escalation attack, where the attacker gains access to privileges that they should not normally have, allowing them to perform actions (like restoring a quarantined file and executing a payload) that a regular user wouldn’t be able to do.
upvoted 1 times
...
...
ha33yp0tt3r69
1 year, 8 months ago
Selected Answer: A
The scenario mentions that an attacker downloaded a malicious file and restored it using a local non-administrative account. This action is related to manipulating files and attempting to gain higher-level privileges, which is characteristic of privilege escalation rather than injection. The term "injection" typically refers to a class of attacks where an attacker inserts malicious code or commands into an application or system to manipulate its behavior, often involving inputs like SQL injection or code injection. The scenario doesn't explicitly mention the injection of code or commands into an application. Privilege escalation attacks focus on gaining unauthorized access to higher-level privileges or permissions, whereas injection attacks usually involve injecting malicious input to exploit vulnerabilities in applications.
upvoted 5 times
BD69
1 year, 3 months ago
Thanks, I never heard of the term injection outside of injecting bad data to unsanitized inputs. Normally, it would be called infection. 3 separate courses and not a single one mentions this. I picked Replay attack only because a lot of malware does this automatically.
upvoted 1 times
...
TheFivePips
1 year, 7 months ago
The question does not state anywhere that the attacker attempted to gain higher level privileges. In fact, it specifically says it used a non admin account. It does say that the attacker used this file in another process to execute a payload, which is pretty textbook injection.
upvoted 1 times
...
...
Yarzo
1 year, 8 months ago
Selected Answer: A
n this scenario, the attacker initially downloaded a malicious file, which was quarantined by the antivirus (AV) solution, preventing it from executing. However, the attacker then used a local non-administrative account to restore the malicious file to a new location. The fact that the attacker restored the file to a new location suggests they gained some form of control over the system, which is indicative of privilege escalation. Privilege escalation is the process of gaining additional permissions or privileges on a system or network, often beyond what is originally allowed for a specific user or account. By restoring the malicious file and subsequently using it to execute a payload, the attacker likely escalated their privileges to carry out malicious activities. This could lead to more severe consequences, such as compromising the entire system or network.
upvoted 1 times
...
Cyberjerry
1 year, 8 months ago
The attacker utilized a local non-administrative account to restore the malicious file to a new location. The file was then used by another process [This action allowed the attacker to potentially execute a payload [it requires a higher permission to excute the file]. The restoration of the file and execution of a payload could be considered a form of privilege escalation because the attacker was able to use a file and execute code that they would not have had access to under normal circumstances, potentially granting them elevated privileges or control over the system.]
upvoted 1 times
...
goodmate
1 year, 8 months ago
A) Privilege escalation The attacker, by restoring and using the quarantined file, may have escalated their privileges or capabilities on the local system, potentially gaining more control or access than the non-administrative account initially had. This aligns with the concept of privilege escalation, which is often seen in the context of security breaches. Given the additional context regarding the involvement of the AV (Antivirus) solution and the attacker's actions, here's an assessment of the question: The scenario describes an attacker downloading a malicious file, which was initially quarantined by the AV solution, and then the attacker used a local non-administrative account to restore the malicious file to a new location. The file was subsequently used by another process to execute a payload. This sequence of actions suggests that the attacker did not necessarily bypass the quarantine but rather circumvented it by restoring and using the quarantined file. ChatGBT answer
upvoted 1 times
...
Only12go
1 year, 8 months ago
Selected Answer: C
Its C because, It doesnt state admin privileges are needed to restore. The attacker could have just went into the file and restored it elsewhere bypassing it. The file itself is malichious and executed a payload.
upvoted 1 times
...
Afel_Null
1 year, 8 months ago
Selected Answer: A
Nothing was injected, it was normally downloaded file, which was then executed - if that's injection, than every single virus attack would automatically be an injection attack. As usual, none of the answers are good, but priviliges escalation seem the best - user got access to another PC and used it to bypass AV quarantine.
upvoted 2 times
...
Sallyabat
1 year, 9 months ago
I think the answer is Privilege Escalation. The attacker won't be able to use the payload by executing another process if it has no privileged access.
upvoted 2 times
...
Abbey2
1 year, 9 months ago
Answer is A. I understand your point. However, privilege escalation can occur even with a local non-administrative account if the attacker is able to gain elevated privileges through their actions. In this case, the attacker was able to restore the malicious file and execute a payload, which implies that they escalated their privileges to some extent, possibly by exploiting a vulnerability or misconfiguration.
upvoted 3 times
...
IT_Newby11111100111
1 year, 9 months ago
This points strongly in favor of Privilege Escalation- https://www.cynet.com/network-attacks/privilege-escalation/ 1st,2nd, 3rd paragraphs.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...