Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam 312-50v11 topic 1 question 131 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 131
Topic #: 1
[All 312-50v11 Questions]

You are a penetration tester working to test the user awareness of the employees of the client XYZ. You harvested two employees' emails from some public sources and are creating a client-side backdoor to send it to the employees via email.
Which stage of the cyber kill chain are you at?

  • A. Reconnaissance
  • B. Weaponization
  • C. Command and control
  • D. Exploitation
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Mdean
Highly Voted 3 years ago
I feel the correct answer is weaponization (B) and not Exploitation (D). Question clearly states that the tester is "creating" the backdoor. It hasn't been sent to the victim yet. So recon was done, weaponization is next, then deliver via email (which is not yet done) and then exploitation. Thoughts?
upvoted 79 times
lovalim
2 years, 6 months ago
A prefect explanation. B Weaponization
upvoted 4 times
...
...
Jude2021
Highly Voted 2 years, 8 months ago
option B, Weaponization
upvoted 8 times
...
ostorgaf
Most Recent 7 months, 3 weeks ago
Selected Answer: B
In the cyber kill chain, the weaponization stage involves crafting and delivering a malicious payload, such as a client-side backdoor, to the target. This stage aims to deliver the initial exploit to the victim's system.
upvoted 1 times
...
MK123One
9 months, 3 weeks ago
Selected Answer: B
the correct answer is B because he just make the recon and have to deliver and the exploit and after that command and control
upvoted 1 times
...
Muli_70
11 months, 3 weeks ago
The stage of the cyber kill chain that the penetration tester is at in this scenario is the Weaponization stage. The cyber kill chain is a framework used to describe the different stages of a cyber attack, from initial reconnaissance to the final objective of the attacker. The stages of the cyber kill chain are: Reconnaissance Weaponization Delivery Exploitation Installation Command and Control Actions on Objectives In this scenario, the penetration tester has already completed the reconnaissance phase by harvesting the email addresses of the employees from public sources. They are now creating a client-side backdoor to send it to the employees via email, which is the weaponization stage. The backdoor is the weapon that the attacker is using to gain access to the employees' systems. Therefore, the correct answer is option B, Weaponization.
upvoted 2 times
...
yasso2023
1 year ago
Selected Answer: B
B. Weaponization
upvoted 2 times
...
piccolopersiano
1 year ago
doc 50v11 pg 31. thus B
upvoted 1 times
...
Sri0908
1 year, 1 month ago
Selected Answer: B
In the given scenario, you have harvested two employees' emails and are creating a client-side backdoor to send it to the employees via email. This means that you are at the "Weaponization" stage, where you are crafting a weapon (in this case, a client-side backdoor) that can be used to exploit the target system. Delivery involves the delivery of the weapon to the target system, while Exploitation involves taking advantage of a vulnerability to gain access to the target system. Installation involves installing the malware on the target system, while Command and control involves establishing a connection to the malware on the target system. Actions on objectives involve the attacker achieving their end goal, which in this case could be accessing sensitive data on the target system.
upvoted 1 times
...
mdmdmd
1 year, 2 months ago
Selected Answer: B
coupling exploit with a backdoor into the deliverable payload...weaponization
upvoted 1 times
...
VOAKDO
1 year, 2 months ago
Selected Answer: B
is "creating" right now.....B=weaponization.
upvoted 1 times
...
snemmani
1 year, 3 months ago
Selected Answer: B
Weaponization it is since the victim has not received it.
upvoted 2 times
...
erpiri
1 year, 4 months ago
Selected Answer: B
El atacante esta creando un backdoor que posteriormente usara en un futuro. Claramente es la opcion B, weaponization.
upvoted 1 times
...
kiki533
1 year, 5 months ago
b is correct
upvoted 1 times
...
Daniel8660
1 year, 6 months ago
Selected Answer: B
Cyber Kill Chain Methodology Weaponization Create a deliverable malicious payload using an exploit and a backdoor. (P.30/14)
upvoted 3 times
...
C1ph3rSt0rm
1 year, 6 months ago
Selected Answer: B
As others have pointed out, this is clearly B. If this is an actual question on the exam, you would think that such an important certification would have someone is revieing these questions. Does anyone proofread the questions on the actual certification? It's things like this that can cause someone to get a question wrong that bshould have been correct.
upvoted 1 times
C1ph3rSt0rm
1 year, 6 months ago
I think I have an understanding of why they selected D. Although I still agree, this question is terrible and should be B, I think this is the test writers rational: 1. You are a pen tester. 2. You have already harvested some emails. These appear to give some inclination that the pen tester already has some internal access and no longer doing recon but setting up the exploit. I disagree with it but this seems like what they're trying to get at. Thoughts?
upvoted 3 times
...
...
sn30
1 year, 7 months ago
Selected Answer: B
Correct answer is B, weaponisation. You are creating the malware which falls into the weaponisation stage
upvoted 1 times
...
tinkerer
1 year, 7 months ago
Selected Answer: B
B is the correct answer
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...