ExamGecko
Question list
Search
Search

Related questions











Question 543 - 312-50v12 discussion

Report
Export

A penetration tester is tasked with gathering information about the subdomains of a target organization's website. The tester needs a versatile and efficient solution for the task. Which of the following options would be the most effective method to accomplish this goal?

A.
Employing a tool like Sublist3r, which is designed to enumerate the subdomains of websites using OSINT
Answers
A.
Employing a tool like Sublist3r, which is designed to enumerate the subdomains of websites using OSINT
B.
Analyzing Linkedin profiles to find employees of the target company and their job titles
Answers
B.
Analyzing Linkedin profiles to find employees of the target company and their job titles
C.
Utilizing the Harvester tool to extract email addresses related to the target domain using a search engine like Google or Bing
Answers
C.
Utilizing the Harvester tool to extract email addresses related to the target domain using a search engine like Google or Bing
D.
Using a people search service, such as Spokeo or Intelius, to gather information about the employees of the target organization
Answers
D.
Using a people search service, such as Spokeo or Intelius, to gather information about the employees of the target organization
Suggested answer: A

Explanation:

Employing a tool like Sublist3r, which is designed to enumerate the subdomains of websites using OSINT, would be the most effective method to accomplish this goal. This option works as follows:

Sublist3r is a python tool designed to enumerate subdomains of websites using OSINT (Open Source Intelligence). It helps penetration testers and bug hunters collect and gather subdomains for the domain they are targeting. Sublist3r enumerates subdomains using many search engines such as Google, Yahoo, Bing, Baidu, and Ask. Sublist3r also enumerates subdomains using Netcraft, Virustotal, ThreatCrowd, DNSdumpster, and ReverseDNS.Subbrute was integrated with Sublist3r to increase the possibility of finding more subdomains using bruteforce with an improved wordlist1.

By using Sublist3r, the tester can quickly and efficiently discover the subdomains of the target organization's website, which can provide valuable information about the network structure, the services offered, the potential vulnerabilities, and the attack surface.Sublist3r can also be used to perform passive reconnaissance, which does not send any packets to the target domain, and thus avoids detection by the target organization12.

The other options are not as effective as option A for the following reasons:

B) Analyzing Linkedin profiles to find employees of the target company and their job titles: This option is not relevant because it does not address the subdomain enumeration task, but the social engineering task. Linkedin is a social networking platform that allows users to create and share their professional profiles, which may include their name, job title, company, skills, education, and contacts. By analyzing Linkedin profiles, the tester may be able to find employees of the target company and their job titles, which can be useful for crafting phishing emails, impersonating employees, or exploiting human weaknesses.However, this option does not help to discover the subdomains of the target organization's website, which is the goal of this scenario3.

C) Utilizing the Harvester tool to extract email addresses related to the target domain using a search engine like Google or Bing: This option is not sufficient because it does not provide a comprehensive list of subdomains, but only a partial list based on email addresses. The Harvester is a tool that can extract email addresses, subdomains, hosts, employee names, open ports, and banners from different public sources, such as search engines, PGP key servers, and SHODAN computer database. By using the Harvester, the tester may be able to extract some email addresses related to the target domain, which can reveal some subdomains, such as mail.target.com or support.target.com.However, this option does not guarantee to find all the subdomains of the target organization's website, as some subdomains may not have any email addresses associated with them, or may not be indexed by the search engines4.

D) Using a people search service, such as Spokeo or Intelius, to gather information about the employees of the target organization: This option is not applicable because it does not address the subdomain enumeration task, but the personal information gathering task. Spokeo and Intelius are people search services that can provide various information about individuals, such as their name, address, phone number, email, social media, criminal records, and financial history. By using these services, the tester may be able to gather information about the employees of the target organization, which can be useful for performing background checks, identity theft, or blackmail.However, this option does not help to discover the subdomains of the target organization's website, which is the goal of this scenario56.

1: GitHub - aboul3la/Sublist3r: Fast subdomains enumeration tool for penetration testers

2: Subdomain Discovery in Cybersecurity with Kali Linux | Medium

3: LinkedIn - Wikipedia

4: The Harvester - Kali Linux Tools

5: Spokeo - Wikipedia

6: Intelius - Wikipedia

asked 18/09/2024
vceplus plus
46 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first